Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Solara.exe

Overview

General Information

Sample name:Solara.exe
Analysis ID:1532907
MD5:c6b00ad78d1b7db6f9474502db6051a6
SHA1:5515a67818d2b2421d5ea51283faace8c4d7f530
SHA256:41e26eb267fcf3194f1036c30f021707a8e916bc480b5f1518d51ad7faf29ce0
Tags:exeuser-KnownStormChaser
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Solara.exe (PID: 7548 cmdline: "C:\Users\user\Desktop\Solara.exe" MD5: C6B00AD78D1B7DB6F9474502DB6051A6)
    • conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 7636 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["allocatinow.sbs", "passimovrt.cfd", "drawwyobstacw.sbs", "mathcucom.sbs", "enlargkiw.sbs", "condifendteu.sbs", "resinedyw.sbs", "ehticsprocw.sbs", "vennurviot.sbs"], "Build id": "HpOoIh--@MoneyPayin"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: Solara.exe PID: 7548JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:04.387538+020020546531A Network Trojan was detected192.168.2.449730104.21.28.222443TCP
      2024-10-14T07:10:05.386596+020020546531A Network Trojan was detected192.168.2.449731188.114.97.3443TCP
      2024-10-14T07:10:06.638060+020020546531A Network Trojan was detected192.168.2.449732104.21.33.249443TCP
      2024-10-14T07:10:07.598398+020020546531A Network Trojan was detected192.168.2.449733104.21.77.78443TCP
      2024-10-14T07:10:08.597694+020020546531A Network Trojan was detected192.168.2.449734172.67.140.193443TCP
      2024-10-14T07:10:09.623731+020020546531A Network Trojan was detected192.168.2.449735104.21.30.221443TCP
      2024-10-14T07:10:10.641390+020020546531A Network Trojan was detected192.168.2.449736172.67.141.136443TCP
      2024-10-14T07:10:11.597583+020020546531A Network Trojan was detected192.168.2.449737188.114.96.3443TCP
      2024-10-14T07:10:13.752381+020020546531A Network Trojan was detected192.168.2.449739104.21.53.8443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:04.387538+020020498361A Network Trojan was detected192.168.2.449730104.21.28.222443TCP
      2024-10-14T07:10:05.386596+020020498361A Network Trojan was detected192.168.2.449731188.114.97.3443TCP
      2024-10-14T07:10:06.638060+020020498361A Network Trojan was detected192.168.2.449732104.21.33.249443TCP
      2024-10-14T07:10:07.598398+020020498361A Network Trojan was detected192.168.2.449733104.21.77.78443TCP
      2024-10-14T07:10:08.597694+020020498361A Network Trojan was detected192.168.2.449734172.67.140.193443TCP
      2024-10-14T07:10:09.623731+020020498361A Network Trojan was detected192.168.2.449735104.21.30.221443TCP
      2024-10-14T07:10:10.641390+020020498361A Network Trojan was detected192.168.2.449736172.67.141.136443TCP
      2024-10-14T07:10:11.597583+020020498361A Network Trojan was detected192.168.2.449737188.114.96.3443TCP
      2024-10-14T07:10:13.752381+020020498361A Network Trojan was detected192.168.2.449739104.21.53.8443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:10.219440+020020565591Domain Observed Used for C2 Detected192.168.2.449736172.67.141.136443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:11.158743+020020565571Domain Observed Used for C2 Detected192.168.2.449737188.114.96.3443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:09.129452+020020565611Domain Observed Used for C2 Detected192.168.2.449735104.21.30.221443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:05.958493+020020565671Domain Observed Used for C2 Detected192.168.2.449732104.21.33.249443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:04.920885+020020565711Domain Observed Used for C2 Detected192.168.2.449731188.114.97.3443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:07.139869+020020565651Domain Observed Used for C2 Detected192.168.2.449733104.21.77.78443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:08.142113+020020565631Domain Observed Used for C2 Detected192.168.2.449734172.67.140.193443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:05.389269+020020565681Domain Observed Used for C2 Detected192.168.2.4608511.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:09.690715+020020565581Domain Observed Used for C2 Detected192.168.2.4525241.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:10.654066+020020565561Domain Observed Used for C2 Detected192.168.2.4506141.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:08.624468+020020565601Domain Observed Used for C2 Detected192.168.2.4575181.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:05.425246+020020565661Domain Observed Used for C2 Detected192.168.2.4644531.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:04.394292+020020565701Domain Observed Used for C2 Detected192.168.2.4623661.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:06.640446+020020565641Domain Observed Used for C2 Detected192.168.2.4501081.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:07.632178+020020565621Domain Observed Used for C2 Detected192.168.2.4622051.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-14T07:10:12.976836+020028586661Domain Observed Used for C2 Detected192.168.2.449738104.102.49.254443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Solara.exeAvira: detected
      Source: https://steamcommunity.com/profiles/76561199724331900URL Reputation: Label: malware
      Source: https://steamcommunity.com/profiles/76561199724331900/inventory/URL Reputation: Label: malware
      Source: C:\Users\user\AppData\Roaming\msvcp110.dllAvira: detection malicious, Label: HEUR/AGEN.1301971
      Source: 2.2.aspnet_regiis.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["allocatinow.sbs", "passimovrt.cfd", "drawwyobstacw.sbs", "mathcucom.sbs", "enlargkiw.sbs", "condifendteu.sbs", "resinedyw.sbs", "ehticsprocw.sbs", "vennurviot.sbs"], "Build id": "HpOoIh--@MoneyPayin"}
      Source: condifendteu.sbsVirustotal: Detection: 17%Perma Link
      Source: vennurviot.sbsVirustotal: Detection: 17%Perma Link
      Source: drawwyobstacw.sbsVirustotal: Detection: 17%Perma Link
      Source: mathcucom.sbsVirustotal: Detection: 20%Perma Link
      Source: sergei-esenin.comVirustotal: Detection: 17%Perma Link
      Source: enlargkiw.sbsVirustotal: Detection: 17%Perma Link
      Source: allocatinow.sbsVirustotal: Detection: 19%Perma Link
      Source: resinedyw.sbsVirustotal: Detection: 17%Perma Link
      Source: ehticsprocw.sbsVirustotal: Detection: 15%Perma Link
      Source: https://vennurviot.sbs/Virustotal: Detection: 17%Perma Link
      Source: drawwyobstacw.sbsVirustotal: Detection: 17%Perma Link
      Source: allocatinow.sbsVirustotal: Detection: 19%Perma Link
      Source: enlargkiw.sbsVirustotal: Detection: 17%Perma Link
      Source: mathcucom.sbsVirustotal: Detection: 20%Perma Link
      Source: https://vennurviot.sbs/apiVirustotal: Detection: 17%Perma Link
      Source: https://mathcucom.sbs/#fVirustotal: Detection: 20%Perma Link
      Source: ehticsprocw.sbsVirustotal: Detection: 15%Perma Link
      Source: https://mathcucom.sbs/Virustotal: Detection: 20%Perma Link
      Source: C:\Users\user\AppData\Roaming\msvcp110.dllReversingLabs: Detection: 65%
      Source: Solara.exeReversingLabs: Detection: 42%
      Source: Solara.exeVirustotal: Detection: 53%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\msvcp110.dllJoe Sandbox ML: detected
      Source: Solara.exeJoe Sandbox ML: detected
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: drawwyobstacw.sbs
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: condifendteu.sbs
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: ehticsprocw.sbs
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: vennurviot.sbs
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: resinedyw.sbs
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: enlargkiw.sbs
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: allocatinow.sbs
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: mathcucom.sbs
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: passimovrt.cfd
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: HpOoIh--@MoneyPayin
      Source: Solara.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 104.21.28.222:443 -> 192.168.2.4:49730 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.33.249:443 -> 192.168.2.4:49732 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.77.78:443 -> 192.168.2.4:49733 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.140.193:443 -> 192.168.2.4:49734 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.30.221:443 -> 192.168.2.4:49735 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.141.136:443 -> 192.168.2.4:49736 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49737 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49738 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.53.8:443 -> 192.168.2.4:49739 version: TLS 1.2
      Source: Solara.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-33C2697Ah]2_2_004431C3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 27BAF212h2_2_004431C3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000001B8h]2_2_00411183
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_00411183
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+6B618F2Dh]2_2_00411183
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-2AE6E5FBh]2_2_0043C516
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, ebx2_2_0043C516
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [ebp-14h]2_2_0040E9B5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx]2_2_0040CF50
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 4E7D7006h2_2_00442F0D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042F000
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+eax*8], 07E776F1h2_2_004440D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, eax2_2_00440080
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 53F09CFAh2_2_00440080
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ebx2_2_00440080
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+ebx*8], 07E776F1h2_2_00440080
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 07E776F1h2_2_0042D166
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_0042D1D1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_00427180
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebx+esi+7DD3323Ah]2_2_004251A6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ecx], si2_2_004251A6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], F3285E74h2_2_00441270
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 731CDBF3h2_2_00441270
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ecx-0000012Ah]2_2_0042C204
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-5Eh]2_2_0042B2D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esp+2Ch], esi2_2_004452A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0041E400
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-522ADBD1h]2_2_00423490
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_004304A1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebx+ecx-4E7A8F49h]2_2_0043250E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esi+0Ch]2_2_0043250E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [edx]2_2_004465D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebp, word ptr [eax]2_2_004465D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_0042F5A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax2_2_0042C644
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0041D610
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [edi+ebx]2_2_00405620
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then dec eax2_2_00403630
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ecx-0000012Ah]2_2_0042C6EF
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, word ptr [esi+eax]2_2_0043E6B0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push eax2_2_00410740
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_00425750
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0042B780
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], 64567875h2_2_00440780
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], F3285E74h2_2_004408D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], F3285E74h2_2_004408D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_004408D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebp, word ptr [eax]2_2_004468B0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0042B963
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], F3285E74h2_2_00444900
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 731CDBF3h2_2_00444900
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+1Ch]2_2_0042A920
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-56h]2_2_0042A920
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, edx2_2_004309D7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, edx2_2_004309D7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_004309D7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, dword ptr [esi+0Ch]2_2_004319E7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_004319E7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_004319E7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [esi], al2_2_0041F980
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esp+10h], 8F3C8951h2_2_0041F980
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]2_2_0042FA20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0041DA30
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, eax2_2_0041DA30
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_0041DA30
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]2_2_00406AD0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [esi+edx+035E8DCAh]2_2_00410AD1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, ebx2_2_0043CAD0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_00439A90
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 07E776F1h2_2_0042CB88
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx2_2_00408CCF
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 07E776F1h2_2_0043CCF0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], dx2_2_00424CF1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, word ptr [ebp+eax*4+00h]2_2_0040BCA0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, word ptr [ebp+ebx*4+00h]2_2_0040BCA0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax2_2_00429D54
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 07E776F1h2_2_00429D54
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, eax2_2_00428D20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_00428D20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax2_2_00428D20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, ebx2_2_00444DC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0042FDD7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], dl2_2_0042FDE1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [esi+28h]2_2_0042FDE1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esi+08h], edi2_2_0042FDE1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [ebp+eax-4A206314h]2_2_00420D85
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-80h]2_2_00420D85
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax-0000008Fh]2_2_00420D85
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [ebp-34h], edi2_2_00420D85
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+752D80C8h]2_2_00422E90
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0042BE90
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, eax2_2_00428EB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_00428EB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax2_2_00428EB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_00430FE2

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2056558 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (condifendteu .sbs) : 192.168.2.4:52524 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056556 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawwyobstacw .sbs) : 192.168.2.4:50614 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056570 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mathcucom .sbs) : 192.168.2.4:62366 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056560 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ehticsprocw .sbs) : 192.168.2.4:57518 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056566 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (enlargkiw .sbs) : 192.168.2.4:64453 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056562 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vennurviot .sbs) : 192.168.2.4:62205 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056565 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (resinedyw .sbs in TLS SNI) : 192.168.2.4:49733 -> 104.21.77.78:443
      Source: Network trafficSuricata IDS: 2056561 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (ehticsprocw .sbs in TLS SNI) : 192.168.2.4:49735 -> 104.21.30.221:443
      Source: Network trafficSuricata IDS: 2056571 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (mathcucom .sbs in TLS SNI) : 192.168.2.4:49731 -> 188.114.97.3:443
      Source: Network trafficSuricata IDS: 2056563 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (vennurviot .sbs in TLS SNI) : 192.168.2.4:49734 -> 172.67.140.193:443
      Source: Network trafficSuricata IDS: 2056567 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (enlargkiw .sbs in TLS SNI) : 192.168.2.4:49732 -> 104.21.33.249:443
      Source: Network trafficSuricata IDS: 2056559 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (condifendteu .sbs in TLS SNI) : 192.168.2.4:49736 -> 172.67.141.136:443
      Source: Network trafficSuricata IDS: 2056557 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (drawwyobstacw .sbs in TLS SNI) : 192.168.2.4:49737 -> 188.114.96.3:443
      Source: Network trafficSuricata IDS: 2056568 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (allocatinow .sbs) : 192.168.2.4:60851 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2056564 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (resinedyw .sbs) : 192.168.2.4:50108 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49732 -> 104.21.33.249:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 104.21.33.249:443
      Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.4:49738 -> 104.102.49.254:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49736 -> 172.67.141.136:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49734 -> 172.67.140.193:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49736 -> 172.67.141.136:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49735 -> 104.21.30.221:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49731 -> 188.114.97.3:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 104.21.28.222:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49734 -> 172.67.140.193:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49733 -> 104.21.77.78:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 104.21.28.222:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 188.114.97.3:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49733 -> 104.21.77.78:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49735 -> 104.21.30.221:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49739 -> 104.21.53.8:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49739 -> 104.21.53.8:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49737 -> 188.114.96.3:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49737 -> 188.114.96.3:443
      Source: Malware configuration extractorURLs: allocatinow.sbs
      Source: Malware configuration extractorURLs: passimovrt.cfd
      Source: Malware configuration extractorURLs: drawwyobstacw.sbs
      Source: Malware configuration extractorURLs: mathcucom.sbs
      Source: Malware configuration extractorURLs: enlargkiw.sbs
      Source: Malware configuration extractorURLs: condifendteu.sbs
      Source: Malware configuration extractorURLs: resinedyw.sbs
      Source: Malware configuration extractorURLs: ehticsprocw.sbs
      Source: Malware configuration extractorURLs: vennurviot.sbs
      Source: Joe Sandbox ViewIP Address: 104.21.53.8 104.21.53.8
      Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
      Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
      Source: Joe Sandbox ViewIP Address: 104.21.33.249 104.21.33.249
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: passimovrt.cfd
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: mathcucom.sbs
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: enlargkiw.sbs
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: resinedyw.sbs
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: vennurviot.sbs
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: ehticsprocw.sbs
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: condifendteu.sbs
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: drawwyobstacw.sbs
      Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sergei-esenin.com
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policydefault-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=Nonesessionid=85b9fb4fb34aa8db42a07078; Path=/; Secure; SameSite=NoneSet-CookienginxServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedMon, 26 Jul 1997 05:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset=UTF-8Content-Type34837Content-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerPragmaKeep-AliveMon, 14 Oct 2024 05:10:12 GMTDateProxy-ConnectioncloseConnectionno-cacheCache-Control equals www.youtube.com (Youtube)
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
      Source: aspnet_regiis.exe, 00000002.00000002.1861062720.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: d.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
      Source: aspnet_regiis.exe, 00000002.00000002.1861062720.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: d.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=Nonesessionid=85b9fb4fb34aa8db42a07078; Path=/; Secure; SameSite=NoneSet-CookienginxServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedMon, 26 Jul 1997 05:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset=UTF-8Content-Type34837Content-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerPragmaKeep-AliveMon, 14 Oct 2024 05:10:12 GMTDateProxy-ConnectioncloseConnectionno-cacheCache-Control equals www.youtube.com (Youtube)
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
      Source: global trafficDNS traffic detected: DNS query: passimovrt.cfd
      Source: global trafficDNS traffic detected: DNS query: mathcucom.sbs
      Source: global trafficDNS traffic detected: DNS query: allocatinow.sbs
      Source: global trafficDNS traffic detected: DNS query: enlargkiw.sbs
      Source: global trafficDNS traffic detected: DNS query: resinedyw.sbs
      Source: global trafficDNS traffic detected: DNS query: vennurviot.sbs
      Source: global trafficDNS traffic detected: DNS query: ehticsprocw.sbs
      Source: global trafficDNS traffic detected: DNS query: condifendteu.sbs
      Source: global trafficDNS traffic detected: DNS query: drawwyobstacw.sbs
      Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
      Source: global trafficDNS traffic detected: DNS query: sergei-esenin.com
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: passimovrt.cfd
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.valvesoftware.com/legal.htm
      Source: aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/
      Source: aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/2k
      Source: aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/W
      Source: aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/api
      Source: aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/api7
      Source: aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allocatinow.sbs/pi
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.akamai.steamstatic
      Source: aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
      Source: aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
      Source: aspnet_regiis.exe, 00000002.00000003.1839250186.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://condifendteu.sbs/api
      Source: aspnet_regiis.exe, 00000002.00000003.1839250186.000000000302B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.000000000302B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drawwyobstacw.sbs/
      Source: aspnet_regiis.exe, 00000002.00000003.1824067435.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drawwyobstacw.sbs/api
      Source: aspnet_regiis.exe, 00000002.00000003.1824067435.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drawwyobstacw.sbs/apiL
      Source: aspnet_regiis.exe, 00000002.00000003.1804655921.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ehticsprocw.sbs/
      Source: aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ehticsprocw.sbs/.
      Source: aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ehticsprocw.sbs/7
      Source: aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ehticsprocw.sbs/api
      Source: aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ehticsprocw.sbs/api=
      Source: aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ehticsprocw.sbs/apig
      Source: aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ehticsprocw.sbs/apis
      Source: aspnet_regiis.exe, 00000002.00000003.1784100878.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://enlargkiw.sbs/api
      Source: aspnet_regiis.exe, 00000002.00000003.1784100878.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://enlargkiw.sbs/apibs
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
      Source: aspnet_regiis.exe, 00000002.00000003.1784100878.000000000300A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1762090963.0000000003009000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/
      Source: aspnet_regiis.exe, 00000002.00000003.1784100878.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/#f
      Source: aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathcucom.sbs/api
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
      Source: aspnet_regiis.exe, 00000002.00000003.1762090963.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000301C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1784100878.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804419835.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804655921.000000000301C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passimovrt.cfd/
      Source: aspnet_regiis.exe, 00000002.00000002.1861062720.0000000002FFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passimovrt.cfd/api
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
      Source: aspnet_regiis.exe, 00000002.00000003.1784100878.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1784100878.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://resinedyw.sbs/
      Source: aspnet_regiis.exe, 00000002.00000003.1784100878.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1784100878.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://resinedyw.sbs/api
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1861062720.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1860514193.000000000309B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com//
      Source: aspnet_regiis.exe, 00000002.00000003.1860514193.000000000309B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/0
      Source: aspnet_regiis.exe, 00000002.00000003.1860514193.000000000309B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/8
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1860603844.00000000030D4000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1861062720.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/api
      Source: aspnet_regiis.exe, 00000002.00000002.1861062720.0000000002FFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/apiS-
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/apir
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sergei-esenin.com/apiv
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
      Source: aspnet_regiis.exe, 00000002.00000003.1839250186.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com//
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
      Source: aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
      Source: aspnet_regiis.exe, 00000002.00000003.1839250186.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003009000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1861062720.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
      Source: aspnet_regiis.exe, 00000002.00000002.1861062720.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
      Source: aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/mobile
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privacy_agreement/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/steam_refunds/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
      Source: aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vennurviot.sbs/
      Source: aspnet_regiis.exe, 00000002.00000003.1839250186.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vennurviot.sbs/#f
      Source: aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vennurviot.sbs/api
      Source: aspnet_regiis.exe, 00000002.00000003.1839250186.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vennurviot.sbs/apis
      Source: aspnet_regiis.exe, 00000002.00000003.1845849529.0000000003087000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.0000000003098000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
      Source: aspnet_regiis.exe, 00000002.00000003.1845849529.0000000003087000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-managem5
      Source: aspnet_regiis.exe, 00000002.00000003.1845566204.0000000003098000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
      Source: aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003097000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
      Source: aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
      Source: aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
      Source: unknownHTTPS traffic detected: 104.21.28.222:443 -> 192.168.2.4:49730 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.33.249:443 -> 192.168.2.4:49732 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.77.78:443 -> 192.168.2.4:49733 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.140.193:443 -> 192.168.2.4:49734 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.30.221:443 -> 192.168.2.4:49735 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.141.136:443 -> 192.168.2.4:49736 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49737 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49738 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.53.8:443 -> 192.168.2.4:49739 version: TLS 1.2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00436290 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00436290
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00436290 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00436290

      System Summary

      barindex
      Source: Solara.exeStatic PE information: section name: |Fa'xdCV
      Source: Solara.exeStatic PE information: section name:
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEFAEB0 GetModuleHandleW,NtQueryInformationProcess,0_2_6CEFAEB0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEFAEB00_2_6CEFAEB0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEFB6000_2_6CEFB600
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEF97100_2_6CEF9710
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF078F00_2_6CF078F0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF1ACF50_2_6CF1ACF5
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0C8D00_2_6CF0C8D0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF058A00_2_6CF058A0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF044800_2_6CF04480
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0A8000_2_6CF0A800
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0D8000_2_6CF0D800
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF075F00_2_6CF075F0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF09DF00_2_6CF09DF0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF04DF00_2_6CF04DF0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF055B00_2_6CF055B0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF07D800_2_6CF07D80
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0BD600_2_6CF0BD60
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEF1D200_2_6CEF1D20
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0A5000_2_6CF0A500
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF036F00_2_6CF036F0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF066A00_2_6CF066A0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF08AA00_2_6CF08AA0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF086A00_2_6CF086A0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF052900_2_6CF05290
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0DA800_2_6CF0DA80
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF04A700_2_6CF04A70
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0BA600_2_6CF0BA60
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEF5A700_2_6CEF5A70
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0D6300_2_6CF0D630
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEF56200_2_6CEF5620
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0C2200_2_6CF0C220
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF05E100_2_6CF05E10
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEFA7D00_2_6CEFA7D0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF093A00_2_6CF093A0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEFB3B00_2_6CEFB3B0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF083700_2_6CF08370
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEF83200_2_6CEF8320
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004111832_2_00411183
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0043C5162_2_0043C516
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040F6A02_2_0040F6A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040CF502_2_0040CF50
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042E0562_2_0042E056
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004360602_2_00436060
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004010002_2_00401000
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004280F42_2_004280F4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0043A0832_2_0043A083
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004400802_2_00440080
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040A0A02_2_0040A0A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040F1502_2_0040F150
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004451002_2_00445100
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004281102_2_00428110
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042D1D12_2_0042D1D1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040B1902_2_0040B190
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040127F2_2_0040127F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042C2042_2_0042C204
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042B2D02_2_0042B2D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004362902_2_00436290
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004452A02_2_004452A0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004013562_2_00401356
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004283C02_2_004283C0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004273E02_2_004273E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0041E4002_2_0041E400
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004444202_2_00444420
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004304A12_2_004304A1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004225602_2_00422560
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004305702_2_00430570
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004465D02_2_004465D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004235E02_2_004235E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004346402_2_00434640
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0043A65C2_2_0043A65C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004036302_2_00403630
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004096B72_2_004096B7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0041771C2_2_0041771C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040972E2_2_0040972E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004348602_2_00434860
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004078302_2_00407830
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0043B8D02_2_0043B8D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004408D02_2_004408D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004468B02_2_004468B0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042B9632_2_0042B963
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004449002_2_00444900
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042A9202_2_0042A920
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004439302_2_00443930
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004309D72_2_004309D7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_004319E72_2_004319E7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0041F9802_2_0041F980
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0041DA302_2_0041DA30
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042CAF12_2_0042CAF1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0043BB302_2_0043BB30
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00446BC02_2_00446BC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00409C012_2_00409C01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00408CCF2_2_00408CCF
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042DC842_2_0042DC84
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040BCA02_2_0040BCA0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00429D542_2_00429D54
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00404D702_2_00404D70
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040AD002_2_0040AD00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0040DD202_2_0040DD20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00428D202_2_00428D20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00427D3F2_2_00427D3F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00444DC02_2_00444DC0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042FDD72_2_0042FDD7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0042FDE12_2_0042FDE1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00420D852_2_00420D85
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00435E202_2_00435E20
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00406E302_2_00406E30
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00422E902_2_00422E90
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00428EB02_2_00428EB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00430FE22_2_00430FE2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 0041D600 appears 217 times
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 0040C800 appears 63 times
      Source: C:\Users\user\Desktop\Solara.exeCode function: String function: 6CF0EB60 appears 33 times
      Source: Solara.exe, 00000000.00000002.1746215834.000000000092E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Solara.exe
      Source: Solara.exeBinary or memory string: OriginalFilenameUlyssesTrumpAmerica131Kaitlyn.pWRT vs Solara.exe
      Source: Solara.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: Solara.exeStatic PE information: Section: |Fa'xdCV ZLIB complexity 1.000327063586098
      Source: classification engineClassification label: mal100.troj.evad.winEXE@4/2@11/10
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0043C420 CoCreateInstance,2_2_0043C420
      Source: C:\Users\user\Desktop\Solara.exeFile created: C:\Users\user\AppData\Roaming\msvcp110.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7556:120:WilError_03
      Source: Solara.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
      Source: C:\Users\user\Desktop\Solara.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Solara.exeReversingLabs: Detection: 42%
      Source: Solara.exeVirustotal: Detection: 53%
      Source: unknownProcess created: C:\Users\user\Desktop\Solara.exe "C:\Users\user\Desktop\Solara.exe"
      Source: C:\Users\user\Desktop\Solara.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Solara.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
      Source: C:\Users\user\Desktop\Solara.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
      Source: Solara.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Solara.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\Solara.exeUnpacked PE file: 0.2.Solara.exe.2a0000.0.unpack |Fa'xdCV:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
      Source: Solara.exeStatic PE information: section name: |Fa'xdCV
      Source: Solara.exeStatic PE information: section name:
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_002F2E70 push ss; ret 0_2_002F2EC8
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF1B401 push ecx; ret 0_2_6CF1B414
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00400000 push eax; iretd 2_2_004000A1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0041C0F3 push cs; mov dword ptr [esp], esi2_2_0041C0FB
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0044D3D8 push edx; retf 0041h2_2_0044D3D9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0044C991 pushfd ; ret 2_2_0044C99D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0044CD67 pushfd ; iretd 2_2_0044CD8F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0044CE33 pushfd ; retf 2_2_0044CE34
      Source: Solara.exeStatic PE information: section name: |Fa'xdCV entropy: 7.999489537609034
      Source: C:\Users\user\Desktop\Solara.exeFile created: C:\Users\user\AppData\Roaming\msvcp110.dllJump to dropped file
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: Process Memory Space: Solara.exe PID: 7548, type: MEMORYSTR
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: BA0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: 2780000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: 4E40000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: 5E40000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: 5F70000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: 6F70000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: 73C0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: 83C0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: 93C0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\Solara.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\msvcp110.dllJump to dropped file
      Source: C:\Users\user\Desktop\Solara.exe TID: 7608Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7688Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7652Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
      Source: C:\Users\user\Desktop\Solara.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: aspnet_regiis.exe, 00000002.00000003.1804655921.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1784100878.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1762090963.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1861062720.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003040000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW.
      Source: aspnet_regiis.exe, 00000002.00000003.1804655921.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1784100878.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1762090963.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1861062720.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003040000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: aspnet_regiis.exe, 00000002.00000002.1861062720.0000000002FFC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00442CC0 LdrInitializeThunk,2_2_00442CC0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0E9E2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF0E9E2
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF15FF0 GetProcessHeap,0_2_6CF15FF0
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0E4B7 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CF0E4B7
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0E9E2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF0E9E2
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF1297C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF1297C
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\Solara.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 400000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEFB600 GetGameData,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,Wow64GetThreadContext,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,GetConsoleWindow,ShowWindow,CreateProcessW,GetThreadContext,VirtualAllocEx,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,CloseHandle,0_2_6CEFB600
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CEFB600 GetGameData,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,Wow64GetThreadContext,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,GetConsoleWindow,ShowWindow,CreateProcessW,GetThreadContext,VirtualAllocEx,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,CloseHandle,0_2_6CEFB600
      Source: C:\Users\user\Desktop\Solara.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: Solara.exe, 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: drawwyobstacw.sbs
      Source: Solara.exe, 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: condifendteu.sbs
      Source: Solara.exe, 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: ehticsprocw.sbs
      Source: Solara.exe, 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: vennurviot.sbss
      Source: Solara.exe, 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: resinedyw.sbs
      Source: Solara.exe, 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: enlargkiw.sbs
      Source: Solara.exe, 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: allocatinow.sbs
      Source: Solara.exe, 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: mathcucom.sbs
      Source: Solara.exe, 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: passimovrt.cfds
      Source: C:\Users\user\Desktop\Solara.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 400000Jump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 401000Jump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 448000Jump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 44B000Jump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 45B000Jump to behavior
      Source: C:\Users\user\Desktop\Solara.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: C00008Jump to behavior
      Source: C:\Users\user\Desktop\Solara.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0EBA8 cpuid 0_2_6CF0EBA8
      Source: C:\Users\user\Desktop\Solara.exeQueries volume information: C:\Users\user\Desktop\Solara.exe VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Solara.exeCode function: 0_2_6CF0E62B GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CF0E62B
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      511
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      PowerShell
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Disable or Modify Tools
      LSASS Memory121
      Security Software Discovery
      Remote Desktop Protocol2
      Clipboard Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
      Virtualization/Sandbox Evasion
      Security Account Manager31
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook511
      Process Injection
      NTDS33
      System Information Discovery
      Distributed Component Object ModelInput Capture114
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
      Deobfuscate/Decode Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
      Obfuscated Files or Information
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
      Software Packing
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      DLL Side-Loading
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Solara.exe42%ReversingLabsWin32.Trojan.SpywareX
      Solara.exe53%VirustotalBrowse
      Solara.exe100%AviraHEUR/AGEN.1352236
      Solara.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\msvcp110.dll100%AviraHEUR/AGEN.1301971
      C:\Users\user\AppData\Roaming\msvcp110.dll100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\msvcp110.dll66%ReversingLabsWin32.Trojan.LummaStealer
      No Antivirus matches
      SourceDetectionScannerLabelLink
      condifendteu.sbs18%VirustotalBrowse
      steamcommunity.com0%VirustotalBrowse
      vennurviot.sbs18%VirustotalBrowse
      drawwyobstacw.sbs18%VirustotalBrowse
      mathcucom.sbs21%VirustotalBrowse
      sergei-esenin.com18%VirustotalBrowse
      enlargkiw.sbs18%VirustotalBrowse
      allocatinow.sbs20%VirustotalBrowse
      resinedyw.sbs18%VirustotalBrowse
      passimovrt.cfd0%VirustotalBrowse
      fp2e7a.wpc.phicdn.net0%VirustotalBrowse
      ehticsprocw.sbs16%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://player.vimeo.com0%URL Reputationsafe
      https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f0%URL Reputationsafe
      https://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
      https://www.gstatic.cn/recaptcha/0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af60%URL Reputationsafe
      http://www.valvesoftware.com/legal.htm0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&0%URL Reputationsafe
      https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL0%URL Reputationsafe
      https://steam.tv/0%URL Reputationsafe
      https://steamcommunity.com/profiles/76561199724331900100%URL Reputationmalware
      https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english0%URL Reputationsafe
      http://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
      https://store.steampowered.com/points/shop/0%URL Reputationsafe
      https://lv.queniujq.cn0%URL Reputationsafe
      https://steamcommunity.com/profiles/76561199724331900/inventory/100%URL Reputationmalware
      https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg0%URL Reputationsafe
      https://store.steampowered.com/privacy_agreement/0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt00%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am0%URL Reputationsafe
      https://checkout.steampowered.com/0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png0%URL Reputationsafe
      https://avatars.akamai.steamstatic0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC0%URL Reputationsafe
      https://store.steampowered.com/;0%URL Reputationsafe
      https://store.steampowered.com/about/0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english0%URL Reputationsafe
      https://help.steampowered.com/en/0%URL Reputationsafe
      https://store.steampowered.com/news/0%URL Reputationsafe
      https://community.akamai.steamstatic.com/0%URL Reputationsafe
      http://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r10%URL Reputationsafe
      https://recaptcha.net/recaptcha/;0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en0%URL Reputationsafe
      https://store.steampowered.com/stats/0%URL Reputationsafe
      https://medal.tv0%URL Reputationsafe
      https://broadcast.st.dl.eccdnx.com0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=10%URL Reputationsafe
      https://store.steampowered.com/steam_refunds/0%URL Reputationsafe
      https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp0%VirustotalBrowse
      https://steamcommunity.com/?subsection=broadcasts0%VirustotalBrowse
      https://vennurviot.sbs/18%VirustotalBrowse
      https://sergei-esenin.com/0%VirustotalBrowse
      https://www.cloudflare.com/learning/access-management/phishing-attack/0%VirustotalBrowse
      drawwyobstacw.sbs18%VirustotalBrowse
      allocatinow.sbs20%VirustotalBrowse
      https://www.youtube.com0%VirustotalBrowse
      https://www.google.com0%VirustotalBrowse
      enlargkiw.sbs18%VirustotalBrowse
      https://enlargkiw.sbs/apibs3%VirustotalBrowse
      https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi0%VirustotalBrowse
      mathcucom.sbs21%VirustotalBrowse
      https://ehticsprocw.sbs/api=0%VirustotalBrowse
      https://vennurviot.sbs/api18%VirustotalBrowse
      https://sketchfab.com0%VirustotalBrowse
      https://www.youtube.com/0%VirustotalBrowse
      https://mathcucom.sbs/#f21%VirustotalBrowse
      https://www.cloudflare.com/5xx-error-landing0%VirustotalBrowse
      ehticsprocw.sbs16%VirustotalBrowse
      https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a0%VirustotalBrowse
      passimovrt.cfd0%VirustotalBrowse
      https://mathcucom.sbs/21%VirustotalBrowse
      https://www.google.com/recaptcha/0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      condifendteu.sbs
      172.67.141.136
      truetrueunknown
      steamcommunity.com
      104.102.49.254
      truetrueunknown
      vennurviot.sbs
      172.67.140.193
      truetrueunknown
      drawwyobstacw.sbs
      188.114.96.3
      truetrueunknown
      mathcucom.sbs
      188.114.97.3
      truetrueunknown
      sergei-esenin.com
      104.21.53.8
      truetrueunknown
      passimovrt.cfd
      104.21.28.222
      truetrueunknown
      ehticsprocw.sbs
      104.21.30.221
      truetrueunknown
      resinedyw.sbs
      104.21.77.78
      truetrueunknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalseunknown
      enlargkiw.sbs
      104.21.33.249
      truetrueunknown
      allocatinow.sbs
      unknown
      unknowntrueunknown
      NameMaliciousAntivirus DetectionReputation
      enlargkiw.sbstrueunknown
      allocatinow.sbstrueunknown
      drawwyobstacw.sbstrueunknown
      mathcucom.sbstrueunknown
      https://steamcommunity.com/profiles/76561199724331900true
      • URL Reputation: malware
      unknown
      https://vennurviot.sbs/apitrueunknown
      ehticsprocw.sbstrueunknown
      passimovrt.cfdtrueunknown
      condifendteu.sbstrue
        unknown
        https://drawwyobstacw.sbs/apitrue
          unknown
          https://resinedyw.sbs/apitrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.cloudflare.com/learning/access-management/phishing-attack/aspnet_regiis.exe, 00000002.00000003.1845566204.0000000003098000.00000004.00000020.00020000.00000000.sdmpfalseunknown
            https://player.vimeo.comaspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://ehticsprocw.sbs/apigaspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&ampaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5faspnet_regiis.exe, 00000002.00000002.1861062720.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://enlargkiw.sbs/apibsaspnet_regiis.exe, 00000002.00000003.1784100878.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://steamcommunity.com/?subsection=broadcastsaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://sergei-esenin.com/aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1861062720.0000000002FE0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1860514193.000000000309B000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://vennurviot.sbs/aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://store.steampowered.com/subscriber_agreement/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.gstatic.cn/recaptcha/aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://sergei-esenin.com/apiS-aspnet_regiis.exe, 00000002.00000002.1861062720.0000000002FFC000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.valvesoftware.com/legal.htmaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.youtube.comaspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&ampaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.pngaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.google.comaspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.pngaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://ehticsprocw.sbs/api=aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedbackaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://allocatinow.sbs/2kaspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tLaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPiaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://s.ytimg.com;aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://steam.tv/aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=englishaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://store.steampowered.com/privacy_agreement/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://store.steampowered.com/points/shop/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://sketchfab.comaspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://lv.queniujq.cnaspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://steamcommunity.com/profiles/76561199724331900/inventory/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmptrue
                    • URL Reputation: malware
                    unknown
                    https://www.youtube.com/aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://mathcucom.sbs/#faspnet_regiis.exe, 00000002.00000003.1784100878.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgaspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://store.steampowered.com/privacy_agreement/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.cloudflare.com/5xx-error-landingaspnet_regiis.exe, 00000002.00000003.1845849529.0000000003087000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.0000000003098000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=enaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&aaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://mathcucom.sbs/aspnet_regiis.exe, 00000002.00000003.1784100878.000000000300A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1762090963.0000000003009000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&amaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.google.com/recaptcha/aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    https://checkout.steampowered.com/aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=englishaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=englishaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ehticsprocw.sbs/apisaspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://sergei-esenin.com/apiraspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.pngaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://avatars.akamai.steamstaticaspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://ehticsprocw.sbs/aspnet_regiis.exe, 00000002.00000003.1804655921.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englisaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhCaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://store.steampowered.com/;aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1861062720.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://sergei-esenin.com/apivaspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://store.steampowered.com/about/aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://steamcommunity.com/my/wishlist/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://steamcommunity.com//aspnet_regiis.exe, 00000002.00000003.1839250186.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=englishaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://ehticsprocw.sbs/7aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://help.steampowered.com/en/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://allocatinow.sbs/api7aspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://steamcommunity.com/market/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://store.steampowered.com/news/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://community.akamai.steamstatic.com/aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://sergei-esenin.com/8aspnet_regiis.exe, 00000002.00000003.1860514193.000000000309B000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://store.steampowered.com/subscriber_agreement/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003008000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://allocatinow.sbs/apiaspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://sergei-esenin.com//aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://recaptcha.net/recaptcha/;aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://sergei-esenin.com/0aspnet_regiis.exe, 00000002.00000003.1860514193.000000000309B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=enaspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://passimovrt.cfd/aspnet_regiis.exe, 00000002.00000003.1762090963.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000301C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1784100878.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839250186.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804419835.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.0000000003012000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804655921.000000000301C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://steamcommunity.com/discussions/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://store.steampowered.com/stats/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://medal.tvaspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://broadcast.st.dl.eccdnx.comaspnet_regiis.exe, 00000002.00000003.1845681126.0000000003012000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://store.steampowered.com/steam_refunds/aspnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://resinedyw.sbs/aspnet_regiis.exe, 00000002.00000003.1784100878.0000000003040000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1784100878.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://vennurviot.sbs/apisaspnet_regiis.exe, 00000002.00000003.1839250186.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1824067435.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845681126.000000000306A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1794055067.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://allocatinow.sbs/piaspnet_regiis.exe, 00000002.00000003.1762090963.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://ehticsprocw.sbs/.aspnet_regiis.exe, 00000002.00000003.1804655921.000000000306A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=easpnet_regiis.exe, 00000002.00000003.1839208298.00000000030A0000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1839208298.000000000309A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1845566204.00000000030A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  104.21.53.8
                                                                  sergei-esenin.comUnited States
                                                                  13335CLOUDFLARENETUStrue
                                                                  188.114.97.3
                                                                  mathcucom.sbsEuropean Union
                                                                  13335CLOUDFLARENETUStrue
                                                                  104.21.33.249
                                                                  enlargkiw.sbsUnited States
                                                                  13335CLOUDFLARENETUStrue
                                                                  104.21.30.221
                                                                  ehticsprocw.sbsUnited States
                                                                  13335CLOUDFLARENETUStrue
                                                                  188.114.96.3
                                                                  drawwyobstacw.sbsEuropean Union
                                                                  13335CLOUDFLARENETUStrue
                                                                  172.67.141.136
                                                                  condifendteu.sbsUnited States
                                                                  13335CLOUDFLARENETUStrue
                                                                  104.102.49.254
                                                                  steamcommunity.comUnited States
                                                                  16625AKAMAI-ASUStrue
                                                                  104.21.28.222
                                                                  passimovrt.cfdUnited States
                                                                  13335CLOUDFLARENETUStrue
                                                                  172.67.140.193
                                                                  vennurviot.sbsUnited States
                                                                  13335CLOUDFLARENETUStrue
                                                                  104.21.77.78
                                                                  resinedyw.sbsUnited States
                                                                  13335CLOUDFLARENETUStrue
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1532907
                                                                  Start date and time:2024-10-14 07:09:04 +02:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 4m 26s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:4
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:Solara.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.evad.winEXE@4/2@11/10
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 99%
                                                                  • Number of executed functions: 20
                                                                  • Number of non-executed functions: 118
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Stop behavior analysis, all processes terminated
                                                                  • Exclude process from analysis (whitelisted): SIHClient.exe
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  TimeTypeDescription
                                                                  01:10:04API Interceptor7x Sleep call for process: aspnet_regiis.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  104.21.53.8file.exeGet hashmaliciousLummaCBrowse
                                                                    SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                      SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                          SecuriteInfo.com.Win32.Evo-gen.11764.10915.exeGet hashmaliciousLummaCBrowse
                                                                            file.exeGet hashmaliciousLummaCBrowse
                                                                              file.exeGet hashmaliciousLummaCBrowse
                                                                                SecuriteInfo.com.Variant.Lazy.606929.30223.9667.exeGet hashmaliciousLummaCBrowse
                                                                                  file.exeGet hashmaliciousLummaCBrowse
                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                      188.114.97.3AeYgxx6XFk.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                      • kitaygorod.top/EternalProcessorMultiwordpressdleTempcentraltemporary.php
                                                                                      http://host.cloudsonicwave.comGet hashmaliciousUnknownBrowse
                                                                                      • host.cloudsonicwave.com/favicon.ico
                                                                                      alWUxZvrvU.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.avantfize.shop/q8x9/
                                                                                      foljNJ4bug.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.bayarcepat19.click/fxts/
                                                                                      RRjzYVukzs.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                      • 863811cm.nyafka.top/video_RequestpacketUpdategeneratorPublic.php
                                                                                      octux.exe.exeGet hashmaliciousUnknownBrowse
                                                                                      • servicetelemetryserver.shop/api/index.php
                                                                                      1728514626a90de45f2defd8a33b94cf7c156a8c78d461f4790dbeeed40e1c4ac3b9785dda970.dat-decoded.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.jandjacres.net/gwdv/?arl=VZkvqQQ3p3ESUHu9QJxv1S9CpeLWgctjzmXLTk8+PgyOEzxKpyaH9RYCK7AmxPqHPjbm&Ph=_ZX8XrK
                                                                                      BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.launchdreamidea.xyz/bd77/
                                                                                      http://embittermentdc.comGet hashmaliciousUnknownBrowse
                                                                                      • embittermentdc.com/favicon.ico
                                                                                      scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                                                                      • paste.ee/d/gvOd3
                                                                                      104.21.33.249SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                                                            Solara.exeGet hashmaliciousLummaCBrowse
                                                                                              Loader.exeGet hashmaliciousLummaCBrowse
                                                                                                Solara.exeGet hashmaliciousLummaCBrowse
                                                                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                    CachemanTray_[1MB]_[unsign].exeGet hashmaliciousLummaCBrowse
                                                                                                      SecuriteInfo.com.Trojan.DownLoader47.43477.29852.19410.exeGet hashmaliciousLummaC, VidarBrowse
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        drawwyobstacw.sbsSoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        WxmEM5HgjY.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        Setup-Premium.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        vennurviot.sbsSoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.140.193
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.140.193
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.140.193
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.46.170
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.140.193
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.140.193
                                                                                                        Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.140.193
                                                                                                        WxmEM5HgjY.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.46.170
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.140.193
                                                                                                        Setup-Premium.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.140.193
                                                                                                        condifendteu.sbsSoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.141.136
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.141.136
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.141.136
                                                                                                        WxmEM5HgjY.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.141.136
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        Setup-Premium.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        steamcommunity.comfile.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.102.49.254
                                                                                                        mathcucom.sbsSoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        WxmEM5HgjY.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Setup-Premium.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.96.3
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                        • 104.26.13.205
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        https://totalcanterbury0.sharefile.com/public/share/web-034ada86e7d04d74Get hashmaliciousUnknownBrowse
                                                                                                        • 172.67.74.152
                                                                                                        arm5.nn-20241014-0317.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                        • 1.13.112.124
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.46.170
                                                                                                        Compliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.17.25.14
                                                                                                        CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                        • 104.26.13.205
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        https://totalcanterbury0.sharefile.com/public/share/web-034ada86e7d04d74Get hashmaliciousUnknownBrowse
                                                                                                        • 172.67.74.152
                                                                                                        arm5.nn-20241014-0317.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                        • 1.13.112.124
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.46.170
                                                                                                        Compliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.17.25.14
                                                                                                        CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                        • 104.26.13.205
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        https://totalcanterbury0.sharefile.com/public/share/web-034ada86e7d04d74Get hashmaliciousUnknownBrowse
                                                                                                        • 172.67.74.152
                                                                                                        arm5.nn-20241014-0317.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                        • 1.13.112.124
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.46.170
                                                                                                        Compliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.17.25.14
                                                                                                        CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                        • 104.26.13.205
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        https://totalcanterbury0.sharefile.com/public/share/web-034ada86e7d04d74Get hashmaliciousUnknownBrowse
                                                                                                        • 172.67.74.152
                                                                                                        arm5.nn-20241014-0317.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                        • 1.13.112.124
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.79.35
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.206.204
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.46.170
                                                                                                        Compliance_Report_Final_Q3_8c3f5541a91374b5bf18ac88017a597742a1891a.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.17.25.14
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        SoftWare.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        SoftWare(2).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        FACTURA.cmdGet hashmaliciousDBatLoaderBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        • 188.114.97.3
                                                                                                        • 104.21.33.249
                                                                                                        • 104.21.30.221
                                                                                                        • 188.114.96.3
                                                                                                        • 172.67.141.136
                                                                                                        • 104.102.49.254
                                                                                                        • 104.21.28.222
                                                                                                        • 172.67.140.193
                                                                                                        • 104.21.77.78
                                                                                                        No context
                                                                                                        Process:C:\Users\user\Desktop\Solara.exe
                                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):42
                                                                                                        Entropy (8bit):4.0050635535766075
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                                                                        MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                                                                        SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                                                                        SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                                                                        SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                                                                        Malicious:true
                                                                                                        Reputation:high, very likely benign file
                                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                                                                        Process:C:\Users\user\Desktop\Solara.exe
                                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):560640
                                                                                                        Entropy (8bit):7.12707279703137
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6144:MVAtDbXzRRyrrRwsX9xNk3jUC7hSkuZigTTu3d0rFLPjMkfaPnWPEdKR+mLSDWH+:gADbyrxWjUAEkOiUtrFEdz9FqPg
                                                                                                        MD5:EC307DA94525FAC6A296C5A017142841
                                                                                                        SHA1:646C9829A5D7BFE1CEDF32C2099BF82DF6C1744E
                                                                                                        SHA-256:9916C345CFF41E4336EC5E24A37DB2D971920E5B626FF3E1F60018606BDD08AD
                                                                                                        SHA-512:AF83F4ABBB95742E83B76AC5B03BFDAABAC0A64431FCC603B2B59474431CCA2AA274040360A8F2DBCD2B8D2AA1450E2CEA3483B6E078D6AA2D19D0ADB94695CF
                                                                                                        Malicious:true
                                                                                                        Antivirus:
                                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                        • Antivirus: ReversingLabs, Detection: 66%
                                                                                                        Reputation:low
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............................S................s...........4.......4......4...........4.....4.....Rich...........................PE..L.....g...........!...&..................................................................@.........................P%..x....%..<...............................L...................................@...@...............T............................text...#........................... ..`.rdata...m.......n..................@..@.data....d...0...X..................@....reloc..L............r..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                        File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                        Entropy (8bit):7.891324481518983
                                                                                                        TrID:
                                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                                        • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                                                        File name:Solara.exe
                                                                                                        File size:365'568 bytes
                                                                                                        MD5:c6b00ad78d1b7db6f9474502db6051a6
                                                                                                        SHA1:5515a67818d2b2421d5ea51283faace8c4d7f530
                                                                                                        SHA256:41e26eb267fcf3194f1036c30f021707a8e916bc480b5f1518d51ad7faf29ce0
                                                                                                        SHA512:3f58fddcfe675326b81f65f9aa19ee481ea9e83ed58de8dcba04276956ec9c874b59ebcc06999d80261c950dcaa8b9ff84fafc84dace66a092a58dff4f1ec5d0
                                                                                                        SSDEEP:6144:5uqr1XEbkS6ew80/0zW6SsZs80FDiRgvljRpeAhTQaS/sB5Z++rlGceseoIzt3N:cAS6eVWMsXiRMRpdUaSUPxr0cebZzt3N
                                                                                                        TLSH:6C74DFDD756072DFC867C4B2DEA82D68EB5434BB831B5207A42705EDAA4D887CF181F2
                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g................................. ... ....@.. ....................... ............@................................
                                                                                                        Icon Hash:90cececece8e8eb0
                                                                                                        Entrypoint:0x46000a
                                                                                                        Entrypoint Section:
                                                                                                        Digitally signed:false
                                                                                                        Imagebase:0x400000
                                                                                                        Subsystem:windows cui
                                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                        Time Stamp:0x670BA2E8 [Sun Oct 13 10:37:28 2024 UTC]
                                                                                                        TLS Callbacks:
                                                                                                        CLR (.Net) Version:
                                                                                                        OS Version Major:4
                                                                                                        OS Version Minor:0
                                                                                                        File Version Major:4
                                                                                                        File Version Minor:0
                                                                                                        Subsystem Version Major:4
                                                                                                        Subsystem Version Minor:0
                                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                        Instruction
                                                                                                        jmp dword ptr [00460000h]
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x5273c0x4f.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x760.rsrc
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000xc.reloc
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x600000x8
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x520000x48.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        |Fa'xdCV0x20000x4f1840x4f20060d7e78de0628cfcacbcaf3d19a92e59False1.000327063586098data7.999489537609034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                        .text0x520000x91180x9200b0dc61e77934988388f187829be47992False0.3882437928082192data4.702599732437166IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        .rsrc0x5c0000x7600x800f1414056b1275b08d42627e676988cd6False0.40576171875data3.909357465484215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .reloc0x5e0000xc0x2001e37c0bd08615c8250069f61ab34fa51False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                        0x600000x100x200320ee449aa5526dabd765a70fb725ea4False0.044921875data0.12227588125913882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                        RT_VERSION0x5c0a00x4d0data0.43262987012987014
                                                                                                        RT_MANIFEST0x5c5700x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                                                        DLLImport
                                                                                                        mscoree.dll_CorExeMain
                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                        2024-10-14T07:10:04.387538+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730104.21.28.222443TCP
                                                                                                        2024-10-14T07:10:04.387538+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730104.21.28.222443TCP
                                                                                                        2024-10-14T07:10:04.394292+02002056570ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mathcucom .sbs)1192.168.2.4623661.1.1.153UDP
                                                                                                        2024-10-14T07:10:04.920885+02002056571ET MALWARE Observed Win32/Lumma Stealer Related Domain (mathcucom .sbs in TLS SNI)1192.168.2.449731188.114.97.3443TCP
                                                                                                        2024-10-14T07:10:05.386596+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449731188.114.97.3443TCP
                                                                                                        2024-10-14T07:10:05.386596+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731188.114.97.3443TCP
                                                                                                        2024-10-14T07:10:05.389269+02002056568ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (allocatinow .sbs)1192.168.2.4608511.1.1.153UDP
                                                                                                        2024-10-14T07:10:05.425246+02002056566ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (enlargkiw .sbs)1192.168.2.4644531.1.1.153UDP
                                                                                                        2024-10-14T07:10:05.958493+02002056567ET MALWARE Observed Win32/Lumma Stealer Related Domain (enlargkiw .sbs in TLS SNI)1192.168.2.449732104.21.33.249443TCP
                                                                                                        2024-10-14T07:10:06.638060+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449732104.21.33.249443TCP
                                                                                                        2024-10-14T07:10:06.638060+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449732104.21.33.249443TCP
                                                                                                        2024-10-14T07:10:06.640446+02002056564ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (resinedyw .sbs)1192.168.2.4501081.1.1.153UDP
                                                                                                        2024-10-14T07:10:07.139869+02002056565ET MALWARE Observed Win32/Lumma Stealer Related Domain (resinedyw .sbs in TLS SNI)1192.168.2.449733104.21.77.78443TCP
                                                                                                        2024-10-14T07:10:07.598398+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449733104.21.77.78443TCP
                                                                                                        2024-10-14T07:10:07.598398+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449733104.21.77.78443TCP
                                                                                                        2024-10-14T07:10:07.632178+02002056562ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vennurviot .sbs)1192.168.2.4622051.1.1.153UDP
                                                                                                        2024-10-14T07:10:08.142113+02002056563ET MALWARE Observed Win32/Lumma Stealer Related Domain (vennurviot .sbs in TLS SNI)1192.168.2.449734172.67.140.193443TCP
                                                                                                        2024-10-14T07:10:08.597694+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449734172.67.140.193443TCP
                                                                                                        2024-10-14T07:10:08.597694+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449734172.67.140.193443TCP
                                                                                                        2024-10-14T07:10:08.624468+02002056560ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ehticsprocw .sbs)1192.168.2.4575181.1.1.153UDP
                                                                                                        2024-10-14T07:10:09.129452+02002056561ET MALWARE Observed Win32/Lumma Stealer Related Domain (ehticsprocw .sbs in TLS SNI)1192.168.2.449735104.21.30.221443TCP
                                                                                                        2024-10-14T07:10:09.623731+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449735104.21.30.221443TCP
                                                                                                        2024-10-14T07:10:09.623731+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449735104.21.30.221443TCP
                                                                                                        2024-10-14T07:10:09.690715+02002056558ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (condifendteu .sbs)1192.168.2.4525241.1.1.153UDP
                                                                                                        2024-10-14T07:10:10.219440+02002056559ET MALWARE Observed Win32/Lumma Stealer Related Domain (condifendteu .sbs in TLS SNI)1192.168.2.449736172.67.141.136443TCP
                                                                                                        2024-10-14T07:10:10.641390+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449736172.67.141.136443TCP
                                                                                                        2024-10-14T07:10:10.641390+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449736172.67.141.136443TCP
                                                                                                        2024-10-14T07:10:10.654066+02002056556ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawwyobstacw .sbs)1192.168.2.4506141.1.1.153UDP
                                                                                                        2024-10-14T07:10:11.158743+02002056557ET MALWARE Observed Win32/Lumma Stealer Related Domain (drawwyobstacw .sbs in TLS SNI)1192.168.2.449737188.114.96.3443TCP
                                                                                                        2024-10-14T07:10:11.597583+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449737188.114.96.3443TCP
                                                                                                        2024-10-14T07:10:11.597583+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449737188.114.96.3443TCP
                                                                                                        2024-10-14T07:10:12.976836+02002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.449738104.102.49.254443TCP
                                                                                                        2024-10-14T07:10:13.752381+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449739104.21.53.8443TCP
                                                                                                        2024-10-14T07:10:13.752381+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449739104.21.53.8443TCP
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Oct 14, 2024 07:10:03.308439016 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:03.308526039 CEST44349730104.21.28.222192.168.2.4
                                                                                                        Oct 14, 2024 07:10:03.308764935 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:03.312206984 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:03.312237024 CEST44349730104.21.28.222192.168.2.4
                                                                                                        Oct 14, 2024 07:10:03.825025082 CEST44349730104.21.28.222192.168.2.4
                                                                                                        Oct 14, 2024 07:10:03.825123072 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:03.882741928 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:03.882786036 CEST44349730104.21.28.222192.168.2.4
                                                                                                        Oct 14, 2024 07:10:03.883949041 CEST44349730104.21.28.222192.168.2.4
                                                                                                        Oct 14, 2024 07:10:03.933037043 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:03.957428932 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:03.957468987 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:03.957838058 CEST44349730104.21.28.222192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.387641907 CEST44349730104.21.28.222192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.387873888 CEST44349730104.21.28.222192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.388266087 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:04.390476942 CEST49730443192.168.2.4104.21.28.222
                                                                                                        Oct 14, 2024 07:10:04.390532970 CEST44349730104.21.28.222192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.407701015 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:04.407789946 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.408112049 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:04.408406019 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:04.408459902 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.920525074 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.920885086 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:04.924742937 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:04.924768925 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.925287008 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.927325010 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:04.927325964 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:04.927545071 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.386656046 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.386913061 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.387100935 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:05.387219906 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:05.387219906 CEST49731443192.168.2.4188.114.97.3
                                                                                                        Oct 14, 2024 07:10:05.387264967 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.387293100 CEST44349731188.114.97.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.446367979 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:05.446470022 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.446691036 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:05.447150946 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:05.447180033 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.958394051 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.958492994 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:05.960727930 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:05.960757017 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.961255074 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.962950945 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:05.962950945 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:05.963182926 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:06.638106108 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:06.638334036 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:06.638421059 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:06.638541937 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:06.638593912 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:06.638626099 CEST49732443192.168.2.4104.21.33.249
                                                                                                        Oct 14, 2024 07:10:06.638642073 CEST44349732104.21.33.249192.168.2.4
                                                                                                        Oct 14, 2024 07:10:06.654234886 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:06.654325008 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:06.654438019 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:06.654915094 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:06.654944897 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.139313936 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.139868975 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:07.141954899 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:07.142008066 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.142537117 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.144274950 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:07.144328117 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:07.144418001 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.598428965 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.598673105 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.598895073 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:07.599021912 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:07.599073887 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.599107981 CEST49733443192.168.2.4104.21.77.78
                                                                                                        Oct 14, 2024 07:10:07.599123001 CEST44349733104.21.77.78192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.656951904 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:07.657061100 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.657169104 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:07.657675982 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:07.657711983 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.141788006 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.142112970 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:08.144272089 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:08.144300938 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.144929886 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.146869898 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:08.146869898 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:08.147131920 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.597755909 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.597984076 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.598120928 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:08.598303080 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:08.598352909 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.598381042 CEST49734443192.168.2.4172.67.140.193
                                                                                                        Oct 14, 2024 07:10:08.598397017 CEST44349734172.67.140.193192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.639012098 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:08.639098883 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.639624119 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:08.639991045 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:08.640026093 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.129247904 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.129451990 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:09.131936073 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:09.131990910 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.132503033 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.134136915 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:09.134200096 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:09.134407043 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.623758078 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.623981953 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.624267101 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:09.632302999 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:09.632302999 CEST49735443192.168.2.4104.21.30.221
                                                                                                        Oct 14, 2024 07:10:09.632371902 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.632405043 CEST44349735104.21.30.221192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.704996109 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:09.705027103 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.705118895 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:09.705554008 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:09.705566883 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.219068050 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.219439983 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:10.221621037 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:10.221635103 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.222048998 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.223937988 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:10.223937988 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:10.224195004 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.641415119 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.641655922 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.641736031 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:10.642435074 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:10.642450094 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.642465115 CEST49736443192.168.2.4172.67.141.136
                                                                                                        Oct 14, 2024 07:10:10.642472029 CEST44349736172.67.141.136192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.671761036 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:10.671849966 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.672030926 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:10.672405958 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:10.672439098 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.158268929 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.158742905 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:11.160933971 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:11.160960913 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.161490917 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.163327932 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:11.163368940 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:11.163660049 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.597621918 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.597877979 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.597990036 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:11.598180056 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:11.598227024 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.598258018 CEST49737443192.168.2.4188.114.96.3
                                                                                                        Oct 14, 2024 07:10:11.598273039 CEST44349737188.114.96.3192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.635956049 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:11.636002064 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.636090994 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:11.636913061 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:11.636944056 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:12.351758957 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:12.351948023 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:12.353389025 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:12.353415966 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:12.353928089 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:12.355632067 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:12.399475098 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:12.976958990 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:12.977020025 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:12.977061987 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:12.977335930 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:12.977397919 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:12.977473974 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:13.110276937 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.110338926 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.110666037 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:13.110724926 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.111099005 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:13.117007971 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.117095947 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:13.117156982 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.117264986 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:13.117280960 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.117311001 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.117336035 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:13.117378950 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.117409945 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:13.117409945 CEST49738443192.168.2.4104.102.49.254
                                                                                                        Oct 14, 2024 07:10:13.117429972 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.117449045 CEST44349738104.102.49.254192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.153563976 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.153670073 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.154021025 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.154370070 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.154449940 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.641685009 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.641938925 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.644156933 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.644208908 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.644625902 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.645984888 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.646028996 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.646091938 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.752327919 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.752372980 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.752402067 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.752450943 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.752466917 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.752533913 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.752568007 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.752604961 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.752666950 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.752895117 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.752929926 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.752954960 CEST49739443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.752969027 CEST44349739104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.852735996 CEST49740443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.852766991 CEST44349740104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.852849960 CEST49740443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.853319883 CEST49740443192.168.2.4104.21.53.8
                                                                                                        Oct 14, 2024 07:10:13.853334904 CEST44349740104.21.53.8192.168.2.4
                                                                                                        Oct 14, 2024 07:10:15.245560884 CEST49740443192.168.2.4104.21.53.8
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Oct 14, 2024 07:10:03.289578915 CEST5580353192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:03.302305937 CEST53558031.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:04.394292116 CEST6236653192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:04.405567884 CEST53623661.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.389269114 CEST6085153192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:05.398931980 CEST53608511.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:05.425246000 CEST6445353192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:05.445228100 CEST53644531.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:06.640445948 CEST5010853192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:06.652894020 CEST53501081.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:07.632178068 CEST6220553192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:07.648672104 CEST53622051.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:08.624468088 CEST5751853192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:08.637670040 CEST53575181.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:09.690715075 CEST5252453192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:09.704094887 CEST53525241.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:10.654066086 CEST5061453192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:10.670743942 CEST53506141.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:11.627775908 CEST6092953192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:11.634932995 CEST53609291.1.1.1192.168.2.4
                                                                                                        Oct 14, 2024 07:10:13.143043995 CEST5872553192.168.2.41.1.1.1
                                                                                                        Oct 14, 2024 07:10:13.152657986 CEST53587251.1.1.1192.168.2.4
                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                        Oct 14, 2024 07:10:03.289578915 CEST192.168.2.41.1.1.10x898dStandard query (0)passimovrt.cfdA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:04.394292116 CEST192.168.2.41.1.1.10x5565Standard query (0)mathcucom.sbsA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:05.389269114 CEST192.168.2.41.1.1.10x18eeStandard query (0)allocatinow.sbsA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:05.425246000 CEST192.168.2.41.1.1.10x8fdStandard query (0)enlargkiw.sbsA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:06.640445948 CEST192.168.2.41.1.1.10xbeeaStandard query (0)resinedyw.sbsA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:07.632178068 CEST192.168.2.41.1.1.10x2b4eStandard query (0)vennurviot.sbsA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:08.624468088 CEST192.168.2.41.1.1.10xa5baStandard query (0)ehticsprocw.sbsA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:09.690715075 CEST192.168.2.41.1.1.10xf5b0Standard query (0)condifendteu.sbsA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:10.654066086 CEST192.168.2.41.1.1.10x3f11Standard query (0)drawwyobstacw.sbsA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:11.627775908 CEST192.168.2.41.1.1.10xea68Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:13.143043995 CEST192.168.2.41.1.1.10xa9a3Standard query (0)sergei-esenin.comA (IP address)IN (0x0001)false
                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                        Oct 14, 2024 07:10:03.302305937 CEST1.1.1.1192.168.2.40x898dNo error (0)passimovrt.cfd104.21.28.222A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:03.302305937 CEST1.1.1.1192.168.2.40x898dNo error (0)passimovrt.cfd172.67.147.188A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:04.405567884 CEST1.1.1.1192.168.2.40x5565No error (0)mathcucom.sbs188.114.97.3A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:04.405567884 CEST1.1.1.1192.168.2.40x5565No error (0)mathcucom.sbs188.114.96.3A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:05.398931980 CEST1.1.1.1192.168.2.40x18eeName error (3)allocatinow.sbsnonenoneA (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:05.445228100 CEST1.1.1.1192.168.2.40x8fdNo error (0)enlargkiw.sbs104.21.33.249A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:05.445228100 CEST1.1.1.1192.168.2.40x8fdNo error (0)enlargkiw.sbs172.67.152.13A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:06.652894020 CEST1.1.1.1192.168.2.40xbeeaNo error (0)resinedyw.sbs104.21.77.78A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:06.652894020 CEST1.1.1.1192.168.2.40xbeeaNo error (0)resinedyw.sbs172.67.205.156A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:07.648672104 CEST1.1.1.1192.168.2.40x2b4eNo error (0)vennurviot.sbs172.67.140.193A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:07.648672104 CEST1.1.1.1192.168.2.40x2b4eNo error (0)vennurviot.sbs104.21.46.170A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:08.637670040 CEST1.1.1.1192.168.2.40xa5baNo error (0)ehticsprocw.sbs104.21.30.221A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:08.637670040 CEST1.1.1.1192.168.2.40xa5baNo error (0)ehticsprocw.sbs172.67.173.224A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:09.704094887 CEST1.1.1.1192.168.2.40xf5b0No error (0)condifendteu.sbs172.67.141.136A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:09.704094887 CEST1.1.1.1192.168.2.40xf5b0No error (0)condifendteu.sbs104.21.79.35A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:10.670743942 CEST1.1.1.1192.168.2.40x3f11No error (0)drawwyobstacw.sbs188.114.96.3A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:10.670743942 CEST1.1.1.1192.168.2.40x3f11No error (0)drawwyobstacw.sbs188.114.97.3A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:11.634932995 CEST1.1.1.1192.168.2.40xea68No error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:13.152657986 CEST1.1.1.1192.168.2.40xa9a3No error (0)sergei-esenin.com104.21.53.8A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:13.152657986 CEST1.1.1.1192.168.2.40xa9a3No error (0)sergei-esenin.com172.67.206.204A (IP address)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:20.772026062 CEST1.1.1.1192.168.2.40xd8c2No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                                        Oct 14, 2024 07:10:20.772026062 CEST1.1.1.1192.168.2.40xd8c2No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                                                        • passimovrt.cfd
                                                                                                        • mathcucom.sbs
                                                                                                        • enlargkiw.sbs
                                                                                                        • resinedyw.sbs
                                                                                                        • vennurviot.sbs
                                                                                                        • ehticsprocw.sbs
                                                                                                        • condifendteu.sbs
                                                                                                        • drawwyobstacw.sbs
                                                                                                        • steamcommunity.com
                                                                                                        • sergei-esenin.com
                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.449730104.21.28.2224437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:03 UTC261OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: passimovrt.cfd
                                                                                                        2024-10-14 05:10:03 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-10-14 05:10:04 UTC827INHTTP/1.1 200 OK
                                                                                                        Date: Mon, 14 Oct 2024 05:10:04 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=ei7opjgmaln9mr8qppr8tnrg96; expires=Thu, 06 Feb 2025 22:56:43 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=usjWCPoAEWQbaSTUZPlzKbEDGV%2F%2F0bSq0pJFh%2Fy54O9kKPLlp2F2kWTedmzWe%2FoQ3L%2FwzMGfzJXDRcCQcr9OwnKp8v2qq0AO5TwTFT7GmFfJprjGmHbQpdSg4aHVGPROhw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d250f931b7243f1-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        2024-10-14 05:10:04 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                                        Data Ascii: aerror #D12
                                                                                                        2024-10-14 05:10:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        1192.168.2.449731188.114.97.34437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:04 UTC260OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: mathcucom.sbs
                                                                                                        2024-10-14 05:10:04 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-10-14 05:10:05 UTC813INHTTP/1.1 200 OK
                                                                                                        Date: Mon, 14 Oct 2024 05:10:05 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=6219au1ic3q17tkn0rk0j4vekb; expires=Thu, 06 Feb 2025 22:56:44 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qcY9RuMWqO58vyUmedjWpjOoSbTjAa88JzdTHFRVCSMSoD4E3rYWbJBnv3CaZjydoMISOXC%2BTNR336yhUCIZb30jL04iqxByYHXKtYsKJvq1CjEinuyXprDe6%2FnzzsEk"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d250f992d304368-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        2024-10-14 05:10:05 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                                        Data Ascii: aerror #D12
                                                                                                        2024-10-14 05:10:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        2192.168.2.449732104.21.33.2494437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:05 UTC260OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: enlargkiw.sbs
                                                                                                        2024-10-14 05:10:05 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-10-14 05:10:06 UTC819INHTTP/1.1 200 OK
                                                                                                        Date: Mon, 14 Oct 2024 05:10:06 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=0466lrgjbcfeq4bk5tfo4oeghr; expires=Thu, 06 Feb 2025 22:56:45 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9pMduwQJLR4NXN%2F4G4MdtFfABmCy%2FPMdoyhiPku8ga2oqcdKn0h%2F8NY2otvUKHsIK%2FLXq38VgxeB27U2nrDSQS6KYaYUvKeS9Jjix42KPjIHQHNzlkUlW%2FR4l9bvFCib"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d250f9fbd247d00-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        2024-10-14 05:10:06 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                                        Data Ascii: aerror #D12
                                                                                                        2024-10-14 05:10:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        3192.168.2.449733104.21.77.784437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:07 UTC260OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: resinedyw.sbs
                                                                                                        2024-10-14 05:10:07 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-10-14 05:10:07 UTC821INHTTP/1.1 200 OK
                                                                                                        Date: Mon, 14 Oct 2024 05:10:07 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=7td817j2apt8l0lftdnqlbof5c; expires=Thu, 06 Feb 2025 22:56:46 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4qzgNcQaI%2Fhw%2FNNl0hWY8hv52tPc34z786gBhWQjtZd%2BPda18SkPnNQstE%2FpM1F%2BTc0wdgq6jUbMlFfAnZHony2vBYfVwRzv%2BoDbfb8lEvR2YtV9JzmEiitiIcuJkzC6"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d250fa72dd38c65-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        2024-10-14 05:10:07 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                                        Data Ascii: aerror #D12
                                                                                                        2024-10-14 05:10:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        4192.168.2.449734172.67.140.1934437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:08 UTC261OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: vennurviot.sbs
                                                                                                        2024-10-14 05:10:08 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-10-14 05:10:08 UTC823INHTTP/1.1 200 OK
                                                                                                        Date: Mon, 14 Oct 2024 05:10:08 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=ac6h60g8ngqg5naboqvkei6jlk; expires=Thu, 06 Feb 2025 22:56:47 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UVO2TPzjlxmNuTjzHOebiGa0LPHQqFMs3O9xPdiy8sCMRW4MeX7Ej3X8h2ELe%2FTQYRB8%2BpZDvJgIfOOq%2FlRqZJsZ7xPS9lXl5lHa4At8xfUW1xjvMkf0spRronl3cb07tQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d250fad48194382-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        2024-10-14 05:10:08 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                                        Data Ascii: aerror #D12
                                                                                                        2024-10-14 05:10:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        5192.168.2.449735104.21.30.2214437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:09 UTC262OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: ehticsprocw.sbs
                                                                                                        2024-10-14 05:10:09 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-10-14 05:10:09 UTC823INHTTP/1.1 200 OK
                                                                                                        Date: Mon, 14 Oct 2024 05:10:09 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=i981f9prjgdlrc4clib6b760mt; expires=Thu, 06 Feb 2025 22:56:48 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7ncqOodjmq0OoahDYn6yPPfEzuObxP1nDWz0c%2BZrRo2iaWsJZDaeU36ZvtQKSqdPScm%2Bj8A3GYedyFFepPkbgQ3p2JpJQ3sE%2FUgvm%2BpGxzRVTj5CwVEF10974Z7cv8kJC90%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d250fb39e2c42c0-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        2024-10-14 05:10:09 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                                        Data Ascii: aerror #D12
                                                                                                        2024-10-14 05:10:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        6192.168.2.449736172.67.141.1364437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:10 UTC263OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: condifendteu.sbs
                                                                                                        2024-10-14 05:10:10 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-10-14 05:10:10 UTC819INHTTP/1.1 200 OK
                                                                                                        Date: Mon, 14 Oct 2024 05:10:10 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=ad6dfas7o31h28aqg0kdb030qo; expires=Thu, 06 Feb 2025 22:56:49 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ukOsaGKe7kfZZOksGZIS8WM6%2BjUlknr8B93l7yo7x1EwUmN5yWV23jkVjyj7f3Dfw%2BHsdBarR08lC7hBP2ni%2BpTuTWU1rD2bgjoVViRM0AZ2fE4MvADnAc8uebzoSwxfwrex"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d250fba4a871879-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        2024-10-14 05:10:10 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                                        Data Ascii: aerror #D12
                                                                                                        2024-10-14 05:10:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        7192.168.2.449737188.114.96.34437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:11 UTC264OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: drawwyobstacw.sbs
                                                                                                        2024-10-14 05:10:11 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-10-14 05:10:11 UTC831INHTTP/1.1 200 OK
                                                                                                        Date: Mon, 14 Oct 2024 05:10:11 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=q690ucjr0q7gmh5ivv4j4nor0k; expires=Thu, 06 Feb 2025 22:56:50 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Wzg%2B7eR6Pq9EitlRAbG2yr1nCK17yWvSrQ5kMAqHRkWiB8xpJVG9r0kPd%2Fp%2BeT4jxsNOZfx4N5ryKpkwdbKfSsW2iRItYCP92WImEkD3nKOehP7rBy5NoSlu%2Fd1K%2F1pWq06hnA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d250fc019a8333c-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        2024-10-14 05:10:11 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                                        Data Ascii: aerror #D12
                                                                                                        2024-10-14 05:10:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        8192.168.2.449738104.102.49.2544437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:12 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Host: steamcommunity.com
                                                                                                        2024-10-14 05:10:12 UTC1870INHTTP/1.1 200 OK
                                                                                                        Server: nginx
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                                        Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                        Cache-Control: no-cache
                                                                                                        Date: Mon, 14 Oct 2024 05:10:12 GMT
                                                                                                        Content-Length: 34837
                                                                                                        Connection: close
                                                                                                        Set-Cookie: sessionid=85b9fb4fb34aa8db42a07078; Path=/; Secure; SameSite=None
                                                                                                        Set-Cookie: steamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=None
                                                                                                        2024-10-14 05:10:12 UTC14514INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                                                                                                        Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                                                                                                        2024-10-14 05:10:13 UTC16384INData Raw: 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0d 0a 09 09 6a 51 75 65 72 79 28 66 75 6e 63 74 69 6f 6e 28 24 29 20 7b 0d 0a 09 09 09 24 28 27 23 67 6c 6f 62 61 6c 5f 68 65 61 64 65 72 20 2e 73 75 70 65 72 6e 61 76 27 29 2e 76 5f 74 6f 6f 6c 74 69 70 28 7b 27 6c 6f 63 61 74 69 6f 6e 27 3a 27 62 6f 74 74 6f 6d 27 2c 20 27 64 65 73 74 72 6f 79 57 68 65 6e 44 6f 6e 65 27 3a 20 66 61 6c 73 65 2c 20 27 74 6f 6f 6c 74 69 70 43 6c 61 73 73 27 3a 20 27 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 65 6e 74 27 2c 20 27 6f 66 66 73 65 74 59 27 3a 2d 36 2c 20 27 6f 66 66 73 65 74 58 27 3a 20 31 2c 20 27 68 6f 72 69 7a 6f 6e 74 61 6c 53 6e 61 70 27 3a 20 34 2c 20 27 74 6f 6f 6c 74 69 70 50 61 72 65 6e 74 27 3a 20 27 23 67 6c 6f
                                                                                                        Data Ascii: <script type="text/javascript">jQuery(function($) {$('#global_header .supernav').v_tooltip({'location':'bottom', 'destroyWhenDone': false, 'tooltipClass': 'supernav_content', 'offsetY':-6, 'offsetX': 1, 'horizontalSnap': 4, 'tooltipParent': '#glo
                                                                                                        2024-10-14 05:10:13 UTC3768INData Raw: 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 73 75 6d 6d 61 72 79 5f 66 6f 6f 74 65 72 22 3e 0d 0a 09 09 09 09 09 09 09 3c 73 70 61 6e 20 64 61 74 61 2d 70 61 6e 65 6c 3d 22 7b 26 71 75 6f 74 3b 66 6f 63 75 73 61 62 6c 65 26 71 75 6f 74 3b 3a 74 72 75 65 2c 26 71 75 6f 74 3b 63 6c 69 63 6b 4f 6e 41 63 74 69 76 61 74 65 26 71 75 6f 74 3b 3a 74 72 75 65 7d 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 3e 56 69 65 77 20 6d 6f 72 65 20 69 6e 66 6f 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 09 09 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 20 24 4a 28 20 66 75 6e 63 74 69 6f 6e 28 29
                                                                                                        Data Ascii: <div class="profile_summary_footer"><span data-panel="{&quot;focusable&quot;:true,&quot;clickOnActivate&quot;:true}" class="whiteLink" class="whiteLink">View more info</span></div><script type="text/javascript"> $J( function()
                                                                                                        2024-10-14 05:10:13 UTC171INData Raw: 09 3c 73 70 61 6e 3e 56 69 65 77 20 6d 6f 62 69 6c 65 20 77 65 62 73 69 74 65 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 0d 0a 09 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 63 6f 6e 74 65 6e 74 20 2d 2d 3e 0d 0a 0d 0a 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 66 72 61 6d 65 20 2d 2d 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e
                                                                                                        Data Ascii: <span>View mobile website</span></div></div></div></div>... responsive_page_content --></div>... responsive_page_frame --></body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        9192.168.2.449739104.21.53.84437636C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2024-10-14 05:10:13 UTC264OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: sergei-esenin.com
                                                                                                        2024-10-14 05:10:13 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2024-10-14 05:10:13 UTC551INHTTP/1.1 200 OK
                                                                                                        Date: Mon, 14 Oct 2024 05:10:13 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        X-Frame-Options: SAMEORIGIN
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Qx9YOjhm3r769go4k3yb%2BmDq06ZAh71riqccHxJV2rEDkOSxchDyyNy9dB2FDH6bT3KagtRAx7PA%2FUXA3h8MGebY6qmgOER9lJ80JnKINb8kbiNZWoBjivJ1FjBR07Y0EpqbLg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d250fcfaacc41a3-EWR
                                                                                                        2024-10-14 05:10:13 UTC818INData Raw: 31 31 35 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                                                                                        Data Ascii: 1151<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                                                                                        2024-10-14 05:10:13 UTC1369INData Raw: 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 6f 6f 6b
                                                                                                        Data Ascii: cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cook
                                                                                                        2024-10-14 05:10:13 UTC1369INData Raw: 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 34 30 34 30 34 30 3b 20 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 62 6f 72 64 65 72 3a 20 30 3b 22 3e 4c 65 61 72 6e 20 4d 6f 72 65 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 66 6f 72 6d 20 61 63 74 69 6f 6e 3d 22 2f 63 64 6e 2d 63 67 69 2f 70 68 69 73 68 2d 62 79 70 61 73 73 22 20 6d 65 74 68 6f 64 3d 22 47 45 54 22 20 65 6e 63 74 79 70 65 3d 22 74 65 78 74 2f 70 6c 61 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74
                                                                                                        Data Ascii: ent/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form action="/cdn-cgi/phish-bypass" method="GET" enctype="text/plain"> <input
                                                                                                        2024-10-14 05:10:13 UTC885INData Raw: 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64
                                                                                                        Data Ascii: <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand
                                                                                                        2024-10-14 05:10:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:01:10:01
                                                                                                        Start date:14/10/2024
                                                                                                        Path:C:\Users\user\Desktop\Solara.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\user\Desktop\Solara.exe"
                                                                                                        Imagebase:0x2a0000
                                                                                                        File size:365'568 bytes
                                                                                                        MD5 hash:C6B00AD78D1B7DB6F9474502DB6051A6
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:low
                                                                                                        Has exited:true

                                                                                                        Target ID:1
                                                                                                        Start time:01:10:01
                                                                                                        Start date:14/10/2024
                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        Imagebase:0x7ff7699e0000
                                                                                                        File size:862'208 bytes
                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:2
                                                                                                        Start time:01:10:02
                                                                                                        Start date:14/10/2024
                                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                                                        Imagebase:0xe30000
                                                                                                        File size:43'016 bytes
                                                                                                        MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:moderate
                                                                                                        Has exited:true

                                                                                                        Reset < >

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:13.2%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:8.3%
                                                                                                          Total number of Nodes:1012
                                                                                                          Total number of Limit Nodes:8
                                                                                                          execution_graph 11689 6cf0e154 11690 6cf0e192 11689->11690 11691 6cf0e15f 11689->11691 11692 6cf0e2ae __DllMainCRTStartup@12 86 API calls 11690->11692 11693 6cf0e184 11691->11693 11694 6cf0e164 11691->11694 11700 6cf0e16e 11692->11700 11701 6cf0e1a7 11693->11701 11696 6cf0e169 11694->11696 11697 6cf0e17a 11694->11697 11696->11700 11715 6cf0e7d2 11696->11715 11720 6cf0e7b3 11697->11720 11702 6cf0e1b3 ___scrt_is_nonwritable_in_current_image 11701->11702 11728 6cf0e843 11702->11728 11704 6cf0e1ba __DllMainCRTStartup@12 11705 6cf0e1e1 11704->11705 11706 6cf0e2a6 11704->11706 11712 6cf0e21d ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 11704->11712 11739 6cf0e7a5 11705->11739 11708 6cf0e9e2 __DllMainCRTStartup@12 4 API calls 11706->11708 11709 6cf0e2ad 11708->11709 11710 6cf0e1f0 __RTC_Initialize 11710->11712 11742 6cf0e6c3 InitializeSListHead 11710->11742 11712->11700 11713 6cf0e1fe 11713->11712 11743 6cf0e77a 11713->11743 11804 6cf139ea 11715->11804 12007 6cf10edc 11720->12007 11723 6cf0e7bc 11723->11700 11726 6cf0e7cf 11726->11700 11727 6cf10ee7 21 API calls 11727->11723 11729 6cf0e84c 11728->11729 11747 6cf0eba8 IsProcessorFeaturePresent 11729->11747 11733 6cf0e85d 11734 6cf0e861 11733->11734 11757 6cf139cd 11733->11757 11734->11704 11737 6cf0e878 11737->11704 11738 6cf10eef ___scrt_uninitialize_crt 7 API calls 11738->11734 11798 6cf0e87c 11739->11798 11741 6cf0e7ac 11741->11710 11742->11713 11744 6cf0e77f ___scrt_release_startup_lock 11743->11744 11745 6cf0eba8 IsProcessorFeaturePresent 11744->11745 11746 6cf0e788 11744->11746 11745->11746 11746->11712 11748 6cf0e858 11747->11748 11749 6cf10ebd 11748->11749 11760 6cf1138c 11749->11760 11752 6cf10ec6 11752->11733 11754 6cf10ece 11755 6cf10ed9 11754->11755 11756 6cf113c8 ___vcrt_uninitialize_locks DeleteCriticalSection 11754->11756 11755->11733 11756->11752 11789 6cf161fd 11757->11789 11761 6cf11395 11760->11761 11763 6cf113be 11761->11763 11764 6cf10ec2 11761->11764 11774 6cf119bc 11761->11774 11765 6cf113c8 ___vcrt_uninitialize_locks DeleteCriticalSection 11763->11765 11764->11752 11766 6cf1133e 11764->11766 11765->11764 11779 6cf118cd 11766->11779 11771 6cf1136e 11771->11754 11772 6cf11371 ___vcrt_uninitialize_ptd 6 API calls 11773 6cf11353 11772->11773 11773->11754 11775 6cf117e2 ___vcrt_FlsSetValue 5 API calls 11774->11775 11776 6cf119d6 11775->11776 11777 6cf119f4 InitializeCriticalSectionAndSpinCount 11776->11777 11778 6cf119df 11776->11778 11777->11778 11778->11761 11780 6cf117e2 ___vcrt_FlsSetValue 5 API calls 11779->11780 11781 6cf118e7 11780->11781 11782 6cf11900 TlsAlloc 11781->11782 11783 6cf11348 11781->11783 11783->11773 11784 6cf1197e 11783->11784 11785 6cf117e2 ___vcrt_FlsSetValue 5 API calls 11784->11785 11786 6cf11998 11785->11786 11787 6cf119b3 TlsSetValue 11786->11787 11788 6cf11361 11786->11788 11787->11788 11788->11771 11788->11772 11790 6cf1620d 11789->11790 11791 6cf0e86a 11789->11791 11790->11791 11793 6cf160c1 11790->11793 11791->11737 11791->11738 11794 6cf160c8 11793->11794 11795 6cf1610b GetStdHandle 11794->11795 11796 6cf1616d 11794->11796 11797 6cf1611e GetFileType 11794->11797 11795->11794 11796->11790 11797->11794 11799 6cf0e888 11798->11799 11800 6cf0e88c 11798->11800 11799->11741 11801 6cf0e9e2 __DllMainCRTStartup@12 4 API calls 11800->11801 11803 6cf0e899 ___scrt_release_startup_lock 11800->11803 11802 6cf0e902 11801->11802 11803->11741 11810 6cf13f6b 11804->11810 11807 6cf10ee7 11990 6cf11273 11807->11990 11811 6cf13f75 11810->11811 11812 6cf0e7d7 11810->11812 11813 6cf15e4c __dosmaperr 6 API calls 11811->11813 11812->11807 11814 6cf13f7c 11813->11814 11814->11812 11815 6cf15e8b __dosmaperr 6 API calls 11814->11815 11816 6cf13f8f 11815->11816 11818 6cf13e32 11816->11818 11819 6cf13e3d 11818->11819 11820 6cf13e4d 11818->11820 11824 6cf13e53 11819->11824 11820->11812 11823 6cf14410 ___free_lconv_mon 14 API calls 11823->11820 11825 6cf13e6e 11824->11825 11826 6cf13e68 11824->11826 11828 6cf14410 ___free_lconv_mon 14 API calls 11825->11828 11827 6cf14410 ___free_lconv_mon 14 API calls 11826->11827 11827->11825 11829 6cf13e7a 11828->11829 11830 6cf14410 ___free_lconv_mon 14 API calls 11829->11830 11831 6cf13e85 11830->11831 11832 6cf14410 ___free_lconv_mon 14 API calls 11831->11832 11833 6cf13e90 11832->11833 11834 6cf14410 ___free_lconv_mon 14 API calls 11833->11834 11835 6cf13e9b 11834->11835 11836 6cf14410 ___free_lconv_mon 14 API calls 11835->11836 11837 6cf13ea6 11836->11837 11838 6cf14410 ___free_lconv_mon 14 API calls 11837->11838 11839 6cf13eb1 11838->11839 11840 6cf14410 ___free_lconv_mon 14 API calls 11839->11840 11841 6cf13ebc 11840->11841 11842 6cf14410 ___free_lconv_mon 14 API calls 11841->11842 11843 6cf13ec7 11842->11843 11844 6cf14410 ___free_lconv_mon 14 API calls 11843->11844 11845 6cf13ed5 11844->11845 11850 6cf13c7f 11845->11850 11851 6cf13c8b ___scrt_is_nonwritable_in_current_image 11850->11851 11866 6cf14363 EnterCriticalSection 11851->11866 11855 6cf13c95 11856 6cf14410 ___free_lconv_mon 14 API calls 11855->11856 11857 6cf13cbf 11855->11857 11856->11857 11867 6cf13cde 11857->11867 11858 6cf13cea 11859 6cf13cf6 ___scrt_is_nonwritable_in_current_image 11858->11859 11871 6cf14363 EnterCriticalSection 11859->11871 11861 6cf13d00 11872 6cf13f20 11861->11872 11863 6cf13d13 11876 6cf13d33 11863->11876 11866->11855 11870 6cf143ab LeaveCriticalSection 11867->11870 11869 6cf13ccc 11869->11858 11870->11869 11871->11861 11873 6cf13f56 __dosmaperr 11872->11873 11874 6cf13f2f __dosmaperr 11872->11874 11873->11863 11874->11873 11879 6cf16c80 11874->11879 11989 6cf143ab LeaveCriticalSection 11876->11989 11878 6cf13d21 11878->11823 11880 6cf16d00 11879->11880 11882 6cf16c96 11879->11882 11883 6cf14410 ___free_lconv_mon 14 API calls 11880->11883 11906 6cf16d4e 11880->11906 11882->11880 11886 6cf14410 ___free_lconv_mon 14 API calls 11882->11886 11902 6cf16cc9 11882->11902 11884 6cf16d22 11883->11884 11885 6cf14410 ___free_lconv_mon 14 API calls 11884->11885 11887 6cf16d35 11885->11887 11891 6cf16cbe 11886->11891 11893 6cf14410 ___free_lconv_mon 14 API calls 11887->11893 11888 6cf14410 ___free_lconv_mon 14 API calls 11889 6cf16cf5 11888->11889 11894 6cf14410 ___free_lconv_mon 14 API calls 11889->11894 11890 6cf16dbc 11895 6cf14410 ___free_lconv_mon 14 API calls 11890->11895 11907 6cf16f9d 11891->11907 11892 6cf14410 ___free_lconv_mon 14 API calls 11898 6cf16ce0 11892->11898 11899 6cf16d43 11893->11899 11894->11880 11900 6cf16dc2 11895->11900 11896 6cf14410 14 API calls ___free_lconv_mon 11901 6cf16d5c 11896->11901 11935 6cf1709b 11898->11935 11904 6cf14410 ___free_lconv_mon 14 API calls 11899->11904 11900->11873 11901->11890 11901->11896 11902->11892 11905 6cf16ceb 11902->11905 11904->11906 11905->11888 11947 6cf16df1 11906->11947 11908 6cf17097 11907->11908 11909 6cf16fae 11907->11909 11908->11902 11910 6cf16fbf 11909->11910 11912 6cf14410 ___free_lconv_mon 14 API calls 11909->11912 11911 6cf16fd1 11910->11911 11913 6cf14410 ___free_lconv_mon 14 API calls 11910->11913 11914 6cf16fe3 11911->11914 11915 6cf14410 ___free_lconv_mon 14 API calls 11911->11915 11912->11910 11913->11911 11916 6cf16ff5 11914->11916 11917 6cf14410 ___free_lconv_mon 14 API calls 11914->11917 11915->11914 11918 6cf17007 11916->11918 11920 6cf14410 ___free_lconv_mon 14 API calls 11916->11920 11917->11916 11919 6cf17019 11918->11919 11921 6cf14410 ___free_lconv_mon 14 API calls 11918->11921 11922 6cf1702b 11919->11922 11923 6cf14410 ___free_lconv_mon 14 API calls 11919->11923 11920->11918 11921->11919 11924 6cf1703d 11922->11924 11925 6cf14410 ___free_lconv_mon 14 API calls 11922->11925 11923->11922 11926 6cf1704f 11924->11926 11928 6cf14410 ___free_lconv_mon 14 API calls 11924->11928 11925->11924 11927 6cf17061 11926->11927 11929 6cf14410 ___free_lconv_mon 14 API calls 11926->11929 11930 6cf17073 11927->11930 11931 6cf14410 ___free_lconv_mon 14 API calls 11927->11931 11928->11926 11929->11927 11932 6cf17085 11930->11932 11933 6cf14410 ___free_lconv_mon 14 API calls 11930->11933 11931->11930 11932->11908 11934 6cf14410 ___free_lconv_mon 14 API calls 11932->11934 11933->11932 11934->11908 11936 6cf170a8 11935->11936 11946 6cf17100 11935->11946 11937 6cf170b8 11936->11937 11938 6cf14410 ___free_lconv_mon 14 API calls 11936->11938 11939 6cf170ca 11937->11939 11940 6cf14410 ___free_lconv_mon 14 API calls 11937->11940 11938->11937 11941 6cf170dc 11939->11941 11942 6cf14410 ___free_lconv_mon 14 API calls 11939->11942 11940->11939 11943 6cf14410 ___free_lconv_mon 14 API calls 11941->11943 11945 6cf170ee 11941->11945 11942->11941 11943->11945 11944 6cf14410 ___free_lconv_mon 14 API calls 11944->11946 11945->11944 11945->11946 11946->11905 11948 6cf16dfe 11947->11948 11952 6cf16e1d 11947->11952 11948->11952 11953 6cf17129 11948->11953 11951 6cf14410 ___free_lconv_mon 14 API calls 11951->11952 11952->11901 11954 6cf1713a 11953->11954 11988 6cf16e17 11953->11988 11955 6cf17104 __dosmaperr 14 API calls 11954->11955 11956 6cf17142 11955->11956 11957 6cf17104 __dosmaperr 14 API calls 11956->11957 11958 6cf1714d 11957->11958 11959 6cf17104 __dosmaperr 14 API calls 11958->11959 11960 6cf17158 11959->11960 11961 6cf17104 __dosmaperr 14 API calls 11960->11961 11962 6cf17163 11961->11962 11963 6cf17104 __dosmaperr 14 API calls 11962->11963 11964 6cf17171 11963->11964 11965 6cf14410 ___free_lconv_mon 14 API calls 11964->11965 11966 6cf1717c 11965->11966 11967 6cf14410 ___free_lconv_mon 14 API calls 11966->11967 11968 6cf17187 11967->11968 11969 6cf14410 ___free_lconv_mon 14 API calls 11968->11969 11970 6cf17192 11969->11970 11971 6cf17104 __dosmaperr 14 API calls 11970->11971 11972 6cf171a0 11971->11972 11973 6cf17104 __dosmaperr 14 API calls 11972->11973 11974 6cf171ae 11973->11974 11975 6cf17104 __dosmaperr 14 API calls 11974->11975 11976 6cf171bf 11975->11976 11977 6cf17104 __dosmaperr 14 API calls 11976->11977 11978 6cf171cd 11977->11978 11979 6cf17104 __dosmaperr 14 API calls 11978->11979 11980 6cf171db 11979->11980 11981 6cf14410 ___free_lconv_mon 14 API calls 11980->11981 11982 6cf171e6 11981->11982 11983 6cf14410 ___free_lconv_mon 14 API calls 11982->11983 11984 6cf171f1 11983->11984 11985 6cf14410 ___free_lconv_mon 14 API calls 11984->11985 11986 6cf171fc 11985->11986 11987 6cf14410 ___free_lconv_mon 14 API calls 11986->11987 11987->11988 11988->11951 11989->11878 11991 6cf1127d 11990->11991 11997 6cf0e7dc 11990->11997 11998 6cf11943 11991->11998 11994 6cf1197e ___vcrt_FlsSetValue 6 API calls 11995 6cf11293 11994->11995 12003 6cf11257 11995->12003 11997->11700 11999 6cf117e2 ___vcrt_FlsSetValue 5 API calls 11998->11999 12000 6cf1195d 11999->12000 12001 6cf11975 TlsGetValue 12000->12001 12002 6cf11284 12000->12002 12001->12002 12002->11994 12004 6cf11261 12003->12004 12006 6cf1126e 12003->12006 12005 6cf12d23 ___std_exception_destroy 14 API calls 12004->12005 12004->12006 12005->12006 12006->11997 12013 6cf112ac 12007->12013 12009 6cf0e7b8 12009->11723 12010 6cf139df 12009->12010 12011 6cf140e8 __dosmaperr 14 API calls 12010->12011 12012 6cf0e7c4 12011->12012 12012->11726 12012->11727 12014 6cf112b5 12013->12014 12015 6cf112b8 GetLastError 12013->12015 12014->12009 12016 6cf11943 ___vcrt_FlsGetValue 6 API calls 12015->12016 12017 6cf112cd 12016->12017 12018 6cf11332 SetLastError 12017->12018 12019 6cf1197e ___vcrt_FlsSetValue 6 API calls 12017->12019 12026 6cf112ec 12017->12026 12018->12009 12020 6cf112e6 __CreateFrameInfo 12019->12020 12021 6cf1130e 12020->12021 12022 6cf1197e ___vcrt_FlsSetValue 6 API calls 12020->12022 12020->12026 12023 6cf1197e ___vcrt_FlsSetValue 6 API calls 12021->12023 12024 6cf11322 12021->12024 12022->12021 12023->12024 12025 6cf12d23 ___std_exception_destroy 14 API calls 12024->12025 12025->12026 12026->12018 11323 6cf0e494 11324 6cf0e4a2 11323->11324 11325 6cf0e49d 11323->11325 11329 6cf0e35e 11324->11329 11344 6cf0e678 11325->11344 11332 6cf0e36a ___scrt_is_nonwritable_in_current_image 11329->11332 11330 6cf0e379 11331 6cf0e393 dllmain_raw 11331->11330 11334 6cf0e3ad dllmain_crt_dispatch 11331->11334 11332->11330 11332->11331 11333 6cf0e38e 11332->11333 11348 6cf036f0 11333->11348 11334->11330 11334->11333 11337 6cf0e3ff 11337->11330 11338 6cf0e408 dllmain_crt_dispatch 11337->11338 11338->11330 11340 6cf0e41b dllmain_raw 11338->11340 11339 6cf036f0 __DllMainCRTStartup@12 5 API calls 11341 6cf0e3e6 11339->11341 11340->11330 11352 6cf0e2ae 11341->11352 11343 6cf0e3f4 dllmain_raw 11343->11337 11345 6cf0e68e 11344->11345 11347 6cf0e697 11345->11347 11688 6cf0e62b GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 11345->11688 11347->11324 11349 6cf0371c 11348->11349 11379 6cf0e0e0 11349->11379 11351 6cf03de3 11351->11337 11351->11339 11354 6cf0e2ba ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 11352->11354 11353 6cf0e2c3 11353->11343 11354->11353 11355 6cf0e356 11354->11355 11356 6cf0e2eb 11354->11356 11408 6cf0e9e2 IsProcessorFeaturePresent 11355->11408 11387 6cf0e813 11356->11387 11359 6cf0e2f0 11396 6cf0e6cf 11359->11396 11361 6cf0e35d ___scrt_is_nonwritable_in_current_image 11362 6cf0e393 dllmain_raw 11361->11362 11364 6cf0e38e 11361->11364 11376 6cf0e379 11361->11376 11365 6cf0e3ad dllmain_crt_dispatch 11362->11365 11362->11376 11363 6cf0e2f5 __RTC_Initialize __DllMainCRTStartup@12 11399 6cf0e9b4 11363->11399 11368 6cf036f0 __DllMainCRTStartup@12 5 API calls 11364->11368 11365->11364 11365->11376 11370 6cf0e3ce 11368->11370 11371 6cf0e3ff 11370->11371 11373 6cf036f0 __DllMainCRTStartup@12 5 API calls 11370->11373 11372 6cf0e408 dllmain_crt_dispatch 11371->11372 11371->11376 11374 6cf0e41b dllmain_raw 11372->11374 11372->11376 11375 6cf0e3e6 11373->11375 11374->11376 11377 6cf0e2ae __DllMainCRTStartup@12 81 API calls 11375->11377 11376->11343 11378 6cf0e3f4 dllmain_raw 11377->11378 11378->11371 11380 6cf0e0e8 11379->11380 11381 6cf0e0e9 IsProcessorFeaturePresent 11379->11381 11380->11351 11383 6cf0e4f4 11381->11383 11386 6cf0e4b7 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11383->11386 11385 6cf0e5d7 11385->11351 11386->11385 11388 6cf0e818 ___scrt_release_startup_lock 11387->11388 11389 6cf0e81c 11388->11389 11391 6cf0e828 __DllMainCRTStartup@12 11388->11391 11412 6cf13849 11389->11412 11393 6cf0e835 11391->11393 11416 6cf13032 11391->11416 11392 6cf0e826 11392->11359 11393->11359 11553 6cf10e9a InterlockedFlushSList 11396->11553 11400 6cf0e9c0 11399->11400 11404 6cf0e314 11400->11404 11560 6cf139f2 11400->11560 11402 6cf0e9ce 11565 6cf10eef 11402->11565 11405 6cf0e350 11404->11405 11671 6cf0e836 11405->11671 11409 6cf0e9f8 __CreateFrameInfo std::bad_exception::bad_exception 11408->11409 11410 6cf0eaa3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11409->11410 11411 6cf0eae7 __CreateFrameInfo 11410->11411 11411->11361 11413 6cf13855 __EH_prolog3 11412->11413 11427 6cf13714 11413->11427 11415 6cf1387c __DllMainCRTStartup@12 11415->11392 11417 6cf1305f 11416->11417 11425 6cf13070 11416->11425 11498 6cf130fa GetModuleHandleW 11417->11498 11422 6cf130ae 11422->11359 11505 6cf12efd 11425->11505 11428 6cf13720 ___scrt_is_nonwritable_in_current_image 11427->11428 11435 6cf14363 EnterCriticalSection 11428->11435 11430 6cf1372e 11436 6cf1376f 11430->11436 11435->11430 11437 6cf1378e 11436->11437 11438 6cf1373b 11436->11438 11437->11438 11443 6cf14410 11437->11443 11440 6cf13763 11438->11440 11497 6cf143ab LeaveCriticalSection 11440->11497 11442 6cf1374c 11442->11415 11444 6cf14445 11443->11444 11445 6cf1441b HeapFree 11443->11445 11444->11438 11445->11444 11446 6cf14430 GetLastError 11445->11446 11447 6cf1443d __dosmaperr 11446->11447 11449 6cf14533 11447->11449 11452 6cf140e8 GetLastError 11449->11452 11451 6cf14538 11451->11444 11453 6cf14104 11452->11453 11454 6cf140fe 11452->11454 11458 6cf14108 SetLastError 11453->11458 11480 6cf15e8b 11453->11480 11475 6cf15e4c 11454->11475 11458->11451 11462 6cf1413d 11464 6cf15e8b __dosmaperr 6 API calls 11462->11464 11463 6cf1414e 11465 6cf15e8b __dosmaperr 6 API calls 11463->11465 11469 6cf1414b 11464->11469 11466 6cf1415a 11465->11466 11467 6cf14175 11466->11467 11468 6cf1415e 11466->11468 11492 6cf13d99 11467->11492 11470 6cf15e8b __dosmaperr 6 API calls 11468->11470 11471 6cf14410 ___free_lconv_mon 12 API calls 11469->11471 11470->11469 11471->11458 11474 6cf14410 ___free_lconv_mon 12 API calls 11474->11458 11476 6cf15cea __dosmaperr 5 API calls 11475->11476 11477 6cf15e68 11476->11477 11478 6cf15e71 11477->11478 11479 6cf15e83 TlsGetValue 11477->11479 11478->11453 11481 6cf15cea __dosmaperr 5 API calls 11480->11481 11482 6cf15ea7 11481->11482 11483 6cf14120 11482->11483 11484 6cf15ec5 TlsSetValue 11482->11484 11483->11458 11485 6cf14546 11483->11485 11490 6cf14553 __dosmaperr 11485->11490 11486 6cf14593 11489 6cf14533 __dosmaperr 13 API calls 11486->11489 11487 6cf1457e HeapAlloc 11488 6cf14135 11487->11488 11487->11490 11488->11462 11488->11463 11489->11488 11490->11486 11490->11487 11491 6cf12c95 __dosmaperr EnterCriticalSection LeaveCriticalSection 11490->11491 11491->11490 11493 6cf13c2d __dosmaperr EnterCriticalSection LeaveCriticalSection 11492->11493 11494 6cf13e07 11493->11494 11495 6cf13d3f __dosmaperr 14 API calls 11494->11495 11496 6cf13e30 11495->11496 11496->11474 11497->11442 11499 6cf13064 11498->11499 11499->11425 11500 6cf13155 GetModuleHandleExW 11499->11500 11501 6cf131a8 11500->11501 11502 6cf13194 GetProcAddress 11500->11502 11503 6cf131c4 11501->11503 11504 6cf131bb FreeLibrary 11501->11504 11502->11501 11503->11425 11504->11503 11506 6cf12f09 ___scrt_is_nonwritable_in_current_image 11505->11506 11520 6cf14363 EnterCriticalSection 11506->11520 11508 6cf12f13 11521 6cf12f4a 11508->11521 11510 6cf12f20 11525 6cf12f3e 11510->11525 11513 6cf130c9 11529 6cf1313c 11513->11529 11515 6cf130d3 11516 6cf130e7 11515->11516 11517 6cf130d7 GetCurrentProcess TerminateProcess 11515->11517 11518 6cf13155 __CreateFrameInfo 3 API calls 11516->11518 11517->11516 11519 6cf130ef ExitProcess 11518->11519 11520->11508 11522 6cf12f56 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 11521->11522 11523 6cf13849 __DllMainCRTStartup@12 14 API calls 11522->11523 11524 6cf12fba __CreateFrameInfo 11522->11524 11523->11524 11524->11510 11528 6cf143ab LeaveCriticalSection 11525->11528 11527 6cf12f2c 11527->11422 11527->11513 11528->11527 11532 6cf1446f 11529->11532 11531 6cf13141 __CreateFrameInfo 11531->11515 11533 6cf1447e __CreateFrameInfo 11532->11533 11534 6cf1448b 11533->11534 11536 6cf15d6f 11533->11536 11534->11531 11539 6cf15cea 11536->11539 11538 6cf15d8b 11538->11534 11540 6cf15d1a 11539->11540 11544 6cf15d16 __dosmaperr 11539->11544 11540->11544 11545 6cf15c1f 11540->11545 11543 6cf15d34 GetProcAddress 11543->11544 11544->11538 11551 6cf15c30 ___vcrt_FlsSetValue 11545->11551 11546 6cf15cc6 11546->11543 11546->11544 11547 6cf15c4e LoadLibraryExW 11548 6cf15c69 GetLastError 11547->11548 11549 6cf15ccd 11547->11549 11548->11551 11549->11546 11550 6cf15cdf FreeLibrary 11549->11550 11550->11546 11551->11546 11551->11547 11552 6cf15c9c LoadLibraryExW 11551->11552 11552->11549 11552->11551 11554 6cf0e6d9 11553->11554 11555 6cf10eaa 11553->11555 11554->11363 11555->11554 11557 6cf12d23 11555->11557 11558 6cf14410 ___free_lconv_mon 14 API calls 11557->11558 11559 6cf12d3b 11558->11559 11559->11555 11561 6cf139fd 11560->11561 11562 6cf13a0f ___scrt_uninitialize_crt 11560->11562 11563 6cf13a0b 11561->11563 11571 6cf168a8 11561->11571 11562->11402 11563->11402 11566 6cf10f02 11565->11566 11567 6cf10ef8 11565->11567 11566->11404 11646 6cf11371 11567->11646 11574 6cf16739 11571->11574 11577 6cf1668d 11574->11577 11578 6cf16699 ___scrt_is_nonwritable_in_current_image 11577->11578 11585 6cf14363 EnterCriticalSection 11578->11585 11580 6cf1670f 11594 6cf1672d 11580->11594 11583 6cf166a3 ___scrt_uninitialize_crt 11583->11580 11586 6cf16601 11583->11586 11585->11583 11587 6cf1660d ___scrt_is_nonwritable_in_current_image 11586->11587 11597 6cf169c5 EnterCriticalSection 11587->11597 11589 6cf16617 ___scrt_uninitialize_crt 11593 6cf16650 11589->11593 11598 6cf16843 11589->11598 11611 6cf16681 11593->11611 11645 6cf143ab LeaveCriticalSection 11594->11645 11596 6cf1671b 11596->11563 11597->11589 11599 6cf16858 ___std_exception_copy 11598->11599 11600 6cf1686a 11599->11600 11601 6cf1685f 11599->11601 11614 6cf167da 11600->11614 11602 6cf16739 ___scrt_uninitialize_crt 68 API calls 11601->11602 11604 6cf16865 11602->11604 11638 6cf128b4 11604->11638 11609 6cf1688b 11627 6cf18064 11609->11627 11644 6cf169d9 LeaveCriticalSection 11611->11644 11613 6cf1666f 11613->11583 11615 6cf167f3 11614->11615 11616 6cf1681a 11614->11616 11615->11616 11617 6cf16bdc ___scrt_uninitialize_crt 39 API calls 11615->11617 11616->11604 11620 6cf16bdc 11616->11620 11618 6cf1680f 11617->11618 11619 6cf18883 ___scrt_uninitialize_crt 64 API calls 11618->11619 11619->11616 11621 6cf16be8 11620->11621 11622 6cf16bfd 11620->11622 11623 6cf14533 __dosmaperr 14 API calls 11621->11623 11622->11609 11624 6cf16bed 11623->11624 11625 6cf12b78 ___std_exception_copy 39 API calls 11624->11625 11626 6cf16bf8 11625->11626 11626->11609 11628 6cf18082 11627->11628 11629 6cf18075 11627->11629 11631 6cf180cb 11628->11631 11634 6cf180a9 11628->11634 11630 6cf14533 __dosmaperr 14 API calls 11629->11630 11632 6cf1807a 11630->11632 11633 6cf14533 __dosmaperr 14 API calls 11631->11633 11632->11604 11635 6cf180d0 11633->11635 11636 6cf17fc2 ___scrt_uninitialize_crt 43 API calls 11634->11636 11637 6cf12b78 ___std_exception_copy 39 API calls 11635->11637 11636->11632 11637->11632 11639 6cf128c0 11638->11639 11640 6cf128d7 11639->11640 11641 6cf1295f ___std_exception_copy 39 API calls 11639->11641 11642 6cf128ea 11640->11642 11643 6cf1295f ___std_exception_copy 39 API calls 11640->11643 11641->11640 11642->11593 11643->11642 11644->11613 11645->11596 11647 6cf10efd 11646->11647 11648 6cf1137b 11646->11648 11650 6cf113c8 11647->11650 11654 6cf11908 11648->11654 11651 6cf113f2 11650->11651 11652 6cf113d3 11650->11652 11651->11566 11653 6cf113dd DeleteCriticalSection 11652->11653 11653->11651 11653->11653 11659 6cf117e2 11654->11659 11657 6cf1193a TlsFree 11658 6cf1192e 11657->11658 11658->11647 11660 6cf117ff 11659->11660 11663 6cf11803 11659->11663 11660->11657 11660->11658 11661 6cf1186b GetProcAddress 11661->11660 11663->11660 11663->11661 11664 6cf1185c 11663->11664 11666 6cf11882 LoadLibraryExW 11663->11666 11664->11661 11665 6cf11864 FreeLibrary 11664->11665 11665->11661 11667 6cf11899 GetLastError 11666->11667 11669 6cf118c9 11666->11669 11668 6cf118a4 ___vcrt_FlsSetValue 11667->11668 11667->11669 11668->11669 11670 6cf118ba LoadLibraryExW 11668->11670 11669->11663 11670->11663 11676 6cf13a22 11671->11676 11674 6cf11371 ___vcrt_uninitialize_ptd 6 API calls 11675 6cf0e355 11674->11675 11675->11353 11679 6cf14268 11676->11679 11680 6cf14272 11679->11680 11681 6cf0e83d 11679->11681 11683 6cf15e0d 11680->11683 11681->11674 11684 6cf15cea __dosmaperr 5 API calls 11683->11684 11685 6cf15e29 11684->11685 11686 6cf15e44 TlsFree 11685->11686 11687 6cf15e32 11685->11687 11687->11681 11688->11347 12027 6cefb600 12030 6cefb620 std::bad_exception::bad_exception 12027->12030 12028 6cf032e7 CreateProcessW 12028->12030 12029 6cf02ab0 CreateRemoteThread 12029->12030 12030->12028 12030->12029 12031 6cf02e4a CloseHandle 12030->12031 12032 6cf00a11 GetConsoleWindow ShowWindow 12030->12032 12034 6cef9710 20 API calls 12030->12034 12036 6cf02db0 CloseHandle 12030->12036 12037 6cf02c67 Wow64SetThreadContext ResumeThread 12030->12037 12038 6cf0276b WriteProcessMemory 12030->12038 12039 6cf0336d GetThreadContext 12030->12039 12040 6cf02365 WriteProcessMemory 12030->12040 12041 6cf0126a VirtualAllocEx 12030->12041 12042 6cf036c0 CloseHandle 12030->12042 12043 6cf034ea ReadProcessMemory 12030->12043 12045 6cf0322a GetConsoleWindow ShowWindow 12030->12045 12050 6cf00eb4 CreateProcessW 12030->12050 12051 6cf01321 VirtualAllocEx 12030->12051 12052 6cf00c70 VirtualAlloc 12030->12052 12053 6cf01445 WriteProcessMemory 12030->12053 12054 6cf0339b VirtualAllocEx 12030->12054 12055 6cf0174a WriteProcessMemory 12030->12055 12057 6cf02ecd 12030->12057 12060 6cf0218f ReadProcessMemory 12030->12060 12061 6cf03562 WriteProcessMemory 12030->12061 12062 6cf03616 WriteProcessMemory 12030->12062 12063 6cf010ef Wow64GetThreadContext 12030->12063 12083 6cefaeb0 12030->12083 12096 6cef9530 12030->12096 12031->12030 12064 6cef9710 12032->12064 12034->12030 12036->12030 12037->12030 12038->12030 12039->12030 12040->12030 12041->12030 12042->12030 12043->12030 12046 6cef9710 20 API calls 12045->12046 12049 6cf03257 12046->12049 12047 6cef9710 20 API calls 12047->12049 12048 6cef9530 5 API calls 12048->12049 12049->12030 12049->12047 12049->12048 12050->12030 12051->12030 12052->12030 12053->12030 12054->12030 12092 6cefb3b0 12055->12092 12058 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12057->12058 12059 6cf02ed7 12058->12059 12060->12030 12061->12030 12062->12030 12063->12030 12068 6cef9777 __InternalCxxFrameHandler 12064->12068 12065 6cefa6ad CloseHandle 12065->12068 12066 6cef9e13 K32GetModuleInformation 12066->12068 12067 6cefa44e VirtualProtect 12067->12068 12068->12065 12068->12066 12068->12067 12069 6cefa6f0 K32GetModuleInformation 12068->12069 12070 6cefa75e VirtualProtect 12068->12070 12071 6cef9cfa GetCurrentProcess 12068->12071 12073 6cef9f43 CreateFileMappingA 12068->12073 12075 6cefa009 MapViewOfFile 12068->12075 12076 6cefa67e CloseHandle CloseHandle 12068->12076 12077 6cefa335 VirtualProtect 12068->12077 12078 6cefa6d0 12068->12078 12081 6cef9fdc CloseHandle 12068->12081 12082 6cef9ea0 GetModuleFileNameA CreateFileA 12068->12082 12069->12068 12070->12068 12100 6cf0ee80 12071->12100 12073->12068 12075->12068 12076->12068 12077->12068 12079 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12078->12079 12080 6cefa6da 12079->12080 12080->12030 12081->12068 12082->12068 12084 6cefaecf 12083->12084 12085 6cefb363 12084->12085 12088 6cefb02d GetModuleHandleW 12084->12088 12091 6cefb0a6 NtQueryInformationProcess 12084->12091 12086 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12085->12086 12087 6cefb373 12086->12087 12087->12030 12102 6cefa7d0 12088->12102 12090 6cefb062 std::bad_exception::bad_exception 12090->12084 12091->12084 12095 6cefb406 12092->12095 12093 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12094 6cefb5e6 12093->12094 12094->12030 12095->12093 12097 6cef9552 12096->12097 12098 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12097->12098 12099 6cef96bf 12098->12099 12099->12030 12101 6cef9d59 GetModuleHandleA 12100->12101 12101->12068 12103 6cefa7f5 12102->12103 12104 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12103->12104 12105 6cefae61 12104->12105 12105->12090 12106 6cf1351e 12121 6cf1556d 12106->12121 12111 6cf13546 12149 6cf13577 12111->12149 12112 6cf1353a 12113 6cf14410 ___free_lconv_mon 14 API calls 12112->12113 12115 6cf13540 12113->12115 12117 6cf14410 ___free_lconv_mon 14 API calls 12118 6cf1356a 12117->12118 12119 6cf14410 ___free_lconv_mon 14 API calls 12118->12119 12120 6cf13570 12119->12120 12122 6cf15576 12121->12122 12126 6cf1352f 12121->12126 12171 6cf14052 12122->12171 12127 6cf15ac4 GetEnvironmentStringsW 12126->12127 12128 6cf15adc 12127->12128 12133 6cf13534 12127->12133 12129 6cf15a21 ___scrt_uninitialize_crt WideCharToMultiByte 12128->12129 12130 6cf15af9 12129->12130 12131 6cf15b03 FreeEnvironmentStringsW 12130->12131 12132 6cf15b0e 12130->12132 12131->12133 12134 6cf143c2 15 API calls 12132->12134 12133->12111 12133->12112 12135 6cf15b15 12134->12135 12136 6cf15b1d 12135->12136 12137 6cf15b2e 12135->12137 12138 6cf14410 ___free_lconv_mon 14 API calls 12136->12138 12139 6cf15a21 ___scrt_uninitialize_crt WideCharToMultiByte 12137->12139 12140 6cf15b22 FreeEnvironmentStringsW 12138->12140 12141 6cf15b3e 12139->12141 12142 6cf15b5f 12140->12142 12143 6cf15b45 12141->12143 12144 6cf15b4d 12141->12144 12142->12133 12145 6cf14410 ___free_lconv_mon 14 API calls 12143->12145 12146 6cf14410 ___free_lconv_mon 14 API calls 12144->12146 12147 6cf15b4b FreeEnvironmentStringsW 12145->12147 12146->12147 12147->12142 12150 6cf1358c 12149->12150 12151 6cf14546 __dosmaperr 14 API calls 12150->12151 12152 6cf135b3 12151->12152 12153 6cf135bb 12152->12153 12162 6cf135c5 12152->12162 12154 6cf14410 ___free_lconv_mon 14 API calls 12153->12154 12170 6cf1354d 12154->12170 12155 6cf13622 12156 6cf14410 ___free_lconv_mon 14 API calls 12155->12156 12156->12170 12157 6cf14546 __dosmaperr 14 API calls 12157->12162 12158 6cf13631 12594 6cf13659 12158->12594 12162->12155 12162->12157 12162->12158 12164 6cf1364c 12162->12164 12167 6cf14410 ___free_lconv_mon 14 API calls 12162->12167 12585 6cf13a70 12162->12585 12163 6cf14410 ___free_lconv_mon 14 API calls 12166 6cf1363e 12163->12166 12165 6cf12ba5 ___std_exception_copy 11 API calls 12164->12165 12168 6cf13658 12165->12168 12169 6cf14410 ___free_lconv_mon 14 API calls 12166->12169 12167->12162 12169->12170 12170->12117 12172 6cf14063 12171->12172 12173 6cf1405d 12171->12173 12175 6cf15e8b __dosmaperr 6 API calls 12172->12175 12192 6cf14069 12172->12192 12174 6cf15e4c __dosmaperr 6 API calls 12173->12174 12174->12172 12176 6cf1407d 12175->12176 12177 6cf14546 __dosmaperr 14 API calls 12176->12177 12176->12192 12179 6cf1408d 12177->12179 12181 6cf14095 12179->12181 12182 6cf140aa 12179->12182 12184 6cf15e8b __dosmaperr 6 API calls 12181->12184 12183 6cf15e8b __dosmaperr 6 API calls 12182->12183 12185 6cf140b6 12183->12185 12186 6cf140a1 12184->12186 12187 6cf140c9 12185->12187 12188 6cf140ba 12185->12188 12191 6cf14410 ___free_lconv_mon 14 API calls 12186->12191 12190 6cf13d99 __dosmaperr 14 API calls 12187->12190 12189 6cf15e8b __dosmaperr 6 API calls 12188->12189 12189->12186 12193 6cf140d4 12190->12193 12191->12192 12195 6cf1406e 12192->12195 12219 6cf13aca 12192->12219 12194 6cf14410 ___free_lconv_mon 14 API calls 12193->12194 12194->12195 12196 6cf15378 12195->12196 12367 6cf154cd 12196->12367 12203 6cf153e2 12392 6cf155c8 12203->12392 12204 6cf153d4 12205 6cf14410 ___free_lconv_mon 14 API calls 12204->12205 12207 6cf153bb 12205->12207 12207->12126 12209 6cf1541a 12210 6cf14533 __dosmaperr 14 API calls 12209->12210 12212 6cf1541f 12210->12212 12211 6cf15461 12215 6cf154aa 12211->12215 12403 6cf14ff1 12211->12403 12213 6cf14410 ___free_lconv_mon 14 API calls 12212->12213 12213->12207 12214 6cf15435 12214->12211 12217 6cf14410 ___free_lconv_mon 14 API calls 12214->12217 12216 6cf14410 ___free_lconv_mon 14 API calls 12215->12216 12216->12207 12217->12211 12230 6cf16368 12219->12230 12222 6cf13ada 12224 6cf13ae4 IsProcessorFeaturePresent 12222->12224 12225 6cf13b03 12222->12225 12226 6cf13af0 12224->12226 12266 6cf131f5 12225->12266 12260 6cf1297c 12226->12260 12269 6cf16296 12230->12269 12233 6cf163ad 12237 6cf163b9 ___scrt_is_nonwritable_in_current_image 12233->12237 12234 6cf140e8 __dosmaperr 14 API calls 12241 6cf163ea __CreateFrameInfo 12234->12241 12235 6cf16409 12236 6cf14533 __dosmaperr 14 API calls 12235->12236 12239 6cf1640e 12236->12239 12237->12234 12237->12235 12238 6cf1641b __CreateFrameInfo 12237->12238 12237->12241 12240 6cf16451 __CreateFrameInfo 12238->12240 12283 6cf14363 EnterCriticalSection 12238->12283 12280 6cf12b78 12239->12280 12245 6cf1658b 12240->12245 12246 6cf1648e 12240->12246 12256 6cf164bc 12240->12256 12241->12235 12241->12238 12259 6cf163f3 12241->12259 12248 6cf16596 12245->12248 12315 6cf143ab LeaveCriticalSection 12245->12315 12246->12256 12284 6cf13f97 GetLastError 12246->12284 12249 6cf131f5 __CreateFrameInfo 21 API calls 12248->12249 12251 6cf1659e 12249->12251 12253 6cf13f97 _unexpected 39 API calls 12257 6cf16511 12253->12257 12255 6cf13f97 _unexpected 39 API calls 12255->12256 12311 6cf16537 12256->12311 12258 6cf13f97 _unexpected 39 API calls 12257->12258 12257->12259 12258->12259 12259->12222 12261 6cf12998 __CreateFrameInfo std::bad_exception::bad_exception 12260->12261 12262 6cf129c4 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12261->12262 12265 6cf12a95 __CreateFrameInfo 12262->12265 12263 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12264 6cf12ab3 12263->12264 12264->12225 12265->12263 12267 6cf13032 __CreateFrameInfo 21 API calls 12266->12267 12268 6cf13206 12267->12268 12270 6cf162a2 ___scrt_is_nonwritable_in_current_image 12269->12270 12275 6cf14363 EnterCriticalSection 12270->12275 12272 6cf162b0 12276 6cf162f2 12272->12276 12275->12272 12279 6cf143ab LeaveCriticalSection 12276->12279 12278 6cf13acf 12278->12222 12278->12233 12279->12278 12316 6cf12ac4 12280->12316 12283->12240 12285 6cf13fb3 12284->12285 12286 6cf13fad 12284->12286 12288 6cf15e8b __dosmaperr 6 API calls 12285->12288 12290 6cf13fb7 SetLastError 12285->12290 12287 6cf15e4c __dosmaperr 6 API calls 12286->12287 12287->12285 12289 6cf13fcf 12288->12289 12289->12290 12292 6cf14546 __dosmaperr 14 API calls 12289->12292 12294 6cf14047 12290->12294 12295 6cf1404c 12290->12295 12293 6cf13fe4 12292->12293 12296 6cf13ffd 12293->12296 12297 6cf13fec 12293->12297 12294->12255 12298 6cf13aca __FrameHandler3::FrameUnwindToState 37 API calls 12295->12298 12300 6cf15e8b __dosmaperr 6 API calls 12296->12300 12299 6cf15e8b __dosmaperr 6 API calls 12297->12299 12301 6cf14051 12298->12301 12309 6cf13ffa 12299->12309 12302 6cf14009 12300->12302 12303 6cf14024 12302->12303 12304 6cf1400d 12302->12304 12305 6cf13d99 __dosmaperr 14 API calls 12303->12305 12306 6cf15e8b __dosmaperr 6 API calls 12304->12306 12308 6cf1402f 12305->12308 12306->12309 12307 6cf14410 ___free_lconv_mon 14 API calls 12307->12290 12310 6cf14410 ___free_lconv_mon 14 API calls 12308->12310 12309->12307 12310->12290 12312 6cf16503 12311->12312 12313 6cf1653b 12311->12313 12312->12253 12312->12257 12312->12259 12366 6cf143ab LeaveCriticalSection 12313->12366 12315->12248 12317 6cf12ad6 ___std_exception_copy 12316->12317 12322 6cf12afb 12317->12322 12319 6cf12aee 12320 6cf128b4 ___std_exception_copy 39 API calls 12319->12320 12321 6cf12af9 12320->12321 12321->12259 12323 6cf12b12 12322->12323 12324 6cf12b0b 12322->12324 12326 6cf12b20 12323->12326 12337 6cf128f0 12323->12337 12333 6cf12919 GetLastError 12324->12333 12326->12319 12328 6cf12b47 12328->12326 12340 6cf12ba5 IsProcessorFeaturePresent 12328->12340 12330 6cf12b77 12331 6cf12ac4 ___std_exception_copy 39 API calls 12330->12331 12332 6cf12b84 12331->12332 12332->12319 12334 6cf12932 12333->12334 12344 6cf14199 12334->12344 12338 6cf12914 12337->12338 12339 6cf128fb GetLastError SetLastError 12337->12339 12338->12328 12339->12328 12341 6cf12bb1 12340->12341 12342 6cf1297c __CreateFrameInfo 8 API calls 12341->12342 12343 6cf12bc6 GetCurrentProcess TerminateProcess 12342->12343 12343->12330 12345 6cf141b2 12344->12345 12346 6cf141ac 12344->12346 12347 6cf15e8b __dosmaperr 6 API calls 12345->12347 12364 6cf1294a SetLastError 12345->12364 12348 6cf15e4c __dosmaperr 6 API calls 12346->12348 12349 6cf141cc 12347->12349 12348->12345 12350 6cf14546 __dosmaperr 14 API calls 12349->12350 12349->12364 12351 6cf141dc 12350->12351 12352 6cf141e4 12351->12352 12353 6cf141f9 12351->12353 12354 6cf15e8b __dosmaperr 6 API calls 12352->12354 12355 6cf15e8b __dosmaperr 6 API calls 12353->12355 12356 6cf141f0 12354->12356 12357 6cf14205 12355->12357 12361 6cf14410 ___free_lconv_mon 14 API calls 12356->12361 12358 6cf14209 12357->12358 12359 6cf14218 12357->12359 12362 6cf15e8b __dosmaperr 6 API calls 12358->12362 12360 6cf13d99 __dosmaperr 14 API calls 12359->12360 12363 6cf14223 12360->12363 12361->12364 12362->12356 12365 6cf14410 ___free_lconv_mon 14 API calls 12363->12365 12364->12323 12365->12364 12366->12312 12368 6cf154d9 ___scrt_is_nonwritable_in_current_image 12367->12368 12370 6cf154f3 12368->12370 12411 6cf14363 EnterCriticalSection 12368->12411 12371 6cf153a2 12370->12371 12373 6cf13aca __FrameHandler3::FrameUnwindToState 39 API calls 12370->12373 12378 6cf150ff 12371->12378 12372 6cf1552f 12412 6cf1554c 12372->12412 12375 6cf1556c 12373->12375 12376 6cf15503 12376->12372 12377 6cf14410 ___free_lconv_mon 14 API calls 12376->12377 12377->12372 12416 6cf14c03 12378->12416 12381 6cf15120 GetOEMCP 12384 6cf15149 12381->12384 12382 6cf15132 12383 6cf15137 GetACP 12382->12383 12382->12384 12383->12384 12384->12207 12385 6cf143c2 12384->12385 12386 6cf14400 12385->12386 12391 6cf143d0 __dosmaperr 12385->12391 12387 6cf14533 __dosmaperr 14 API calls 12386->12387 12389 6cf143fe 12387->12389 12388 6cf143eb HeapAlloc 12388->12389 12388->12391 12389->12203 12389->12204 12391->12386 12391->12388 12459 6cf12c95 12391->12459 12393 6cf150ff 41 API calls 12392->12393 12395 6cf155e8 12393->12395 12394 6cf156ed 12396 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12394->12396 12395->12394 12397 6cf15625 IsValidCodePage 12395->12397 12402 6cf15640 std::bad_exception::bad_exception 12395->12402 12398 6cf1540f 12396->12398 12397->12394 12399 6cf15637 12397->12399 12398->12209 12398->12214 12400 6cf15660 GetCPInfo 12399->12400 12399->12402 12400->12394 12400->12402 12473 6cf151d3 12402->12473 12404 6cf14ffd ___scrt_is_nonwritable_in_current_image 12403->12404 12559 6cf14363 EnterCriticalSection 12404->12559 12406 6cf15007 12560 6cf1503e 12406->12560 12411->12376 12415 6cf143ab LeaveCriticalSection 12412->12415 12414 6cf15553 12414->12370 12415->12414 12417 6cf14c21 12416->12417 12418 6cf14c1a 12416->12418 12417->12418 12419 6cf13f97 _unexpected 39 API calls 12417->12419 12418->12381 12418->12382 12420 6cf14c42 12419->12420 12424 6cf169ed 12420->12424 12425 6cf14c58 12424->12425 12426 6cf16a00 12424->12426 12428 6cf16a4b 12425->12428 12426->12425 12432 6cf16ecc 12426->12432 12429 6cf16a73 12428->12429 12430 6cf16a5e 12428->12430 12429->12418 12430->12429 12454 6cf155b5 12430->12454 12433 6cf16ed8 ___scrt_is_nonwritable_in_current_image 12432->12433 12434 6cf13f97 _unexpected 39 API calls 12433->12434 12435 6cf16ee1 12434->12435 12442 6cf16f27 12435->12442 12445 6cf14363 EnterCriticalSection 12435->12445 12437 6cf16eff 12446 6cf16f4d 12437->12446 12442->12425 12443 6cf13aca __FrameHandler3::FrameUnwindToState 39 API calls 12444 6cf16f4c 12443->12444 12445->12437 12447 6cf16f5b __dosmaperr 12446->12447 12449 6cf16f10 12446->12449 12448 6cf16c80 __dosmaperr 14 API calls 12447->12448 12447->12449 12448->12449 12450 6cf16f2c 12449->12450 12453 6cf143ab LeaveCriticalSection 12450->12453 12452 6cf16f23 12452->12442 12452->12443 12453->12452 12455 6cf13f97 _unexpected 39 API calls 12454->12455 12456 6cf155ba 12455->12456 12457 6cf154cd ___scrt_uninitialize_crt 39 API calls 12456->12457 12458 6cf155c5 12457->12458 12458->12429 12462 6cf12cc1 12459->12462 12463 6cf12ccd ___scrt_is_nonwritable_in_current_image 12462->12463 12468 6cf14363 EnterCriticalSection 12463->12468 12465 6cf12cd8 __CreateFrameInfo 12469 6cf12d0f 12465->12469 12468->12465 12472 6cf143ab LeaveCriticalSection 12469->12472 12471 6cf12ca0 12471->12391 12472->12471 12474 6cf151fb GetCPInfo 12473->12474 12475 6cf152c4 12473->12475 12474->12475 12476 6cf15213 12474->12476 12478 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12475->12478 12484 6cf1720d 12476->12484 12480 6cf15376 12478->12480 12480->12394 12483 6cf17bc3 43 API calls 12483->12475 12485 6cf14c03 39 API calls 12484->12485 12486 6cf1722d 12485->12486 12504 6cf15967 12486->12504 12488 6cf172e9 12491 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12488->12491 12489 6cf172e1 12507 6cf1730e 12489->12507 12490 6cf1725a 12490->12488 12490->12489 12493 6cf143c2 15 API calls 12490->12493 12495 6cf1727f __alloca_probe_16 std::bad_exception::bad_exception 12490->12495 12494 6cf1527b 12491->12494 12493->12495 12499 6cf17bc3 12494->12499 12495->12489 12496 6cf15967 ___scrt_uninitialize_crt MultiByteToWideChar 12495->12496 12497 6cf172c8 12496->12497 12497->12489 12498 6cf172cf GetStringTypeW 12497->12498 12498->12489 12500 6cf14c03 39 API calls 12499->12500 12501 6cf17bd6 12500->12501 12513 6cf179d4 12501->12513 12511 6cf158cf 12504->12511 12508 6cf1731a 12507->12508 12509 6cf1732b 12507->12509 12508->12509 12510 6cf14410 ___free_lconv_mon 14 API calls 12508->12510 12509->12488 12510->12509 12512 6cf158e0 MultiByteToWideChar 12511->12512 12512->12490 12514 6cf179ef 12513->12514 12515 6cf15967 ___scrt_uninitialize_crt MultiByteToWideChar 12514->12515 12519 6cf17a33 12515->12519 12516 6cf17bae 12517 6cf0e0e0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 12516->12517 12518 6cf1529c 12517->12518 12518->12483 12519->12516 12520 6cf143c2 15 API calls 12519->12520 12522 6cf17a59 __alloca_probe_16 12519->12522 12534 6cf17b01 12519->12534 12520->12522 12521 6cf1730e __freea 14 API calls 12521->12516 12523 6cf15967 ___scrt_uninitialize_crt MultiByteToWideChar 12522->12523 12522->12534 12524 6cf17aa2 12523->12524 12524->12534 12541 6cf15f18 12524->12541 12527 6cf17b10 12529 6cf17b99 12527->12529 12530 6cf17b22 __alloca_probe_16 12527->12530 12531 6cf143c2 15 API calls 12527->12531 12528 6cf17ad8 12533 6cf15f18 6 API calls 12528->12533 12528->12534 12532 6cf1730e __freea 14 API calls 12529->12532 12530->12529 12535 6cf15f18 6 API calls 12530->12535 12531->12530 12532->12534 12533->12534 12534->12521 12536 6cf17b65 12535->12536 12536->12529 12547 6cf15a21 12536->12547 12538 6cf17b7f 12538->12529 12539 6cf17b88 12538->12539 12540 6cf1730e __freea 14 API calls 12539->12540 12540->12534 12550 6cf15beb 12541->12550 12545 6cf15f69 LCMapStringW 12546 6cf15f29 12545->12546 12546->12527 12546->12528 12546->12534 12548 6cf15a34 ___scrt_uninitialize_crt 12547->12548 12549 6cf15a72 WideCharToMultiByte 12548->12549 12549->12538 12551 6cf15cea __dosmaperr 5 API calls 12550->12551 12552 6cf15c01 12551->12552 12552->12546 12553 6cf15f75 12552->12553 12556 6cf15c05 12553->12556 12555 6cf15f80 12555->12545 12557 6cf15cea __dosmaperr 5 API calls 12556->12557 12558 6cf15c1b 12557->12558 12558->12555 12559->12406 12570 6cf157cd 12560->12570 12562 6cf15060 12563 6cf157cd 39 API calls 12562->12563 12564 6cf1507f 12563->12564 12565 6cf15014 12564->12565 12566 6cf14410 ___free_lconv_mon 14 API calls 12564->12566 12567 6cf15032 12565->12567 12566->12565 12584 6cf143ab LeaveCriticalSection 12567->12584 12569 6cf15020 12569->12215 12571 6cf157de 12570->12571 12575 6cf157da __InternalCxxFrameHandler 12570->12575 12572 6cf157e5 12571->12572 12577 6cf157f8 std::bad_exception::bad_exception 12571->12577 12573 6cf14533 __dosmaperr 14 API calls 12572->12573 12574 6cf157ea 12573->12574 12576 6cf12b78 ___std_exception_copy 39 API calls 12574->12576 12575->12562 12576->12575 12577->12575 12578 6cf15826 12577->12578 12579 6cf1582f 12577->12579 12580 6cf14533 __dosmaperr 14 API calls 12578->12580 12579->12575 12582 6cf14533 __dosmaperr 14 API calls 12579->12582 12581 6cf1582b 12580->12581 12583 6cf12b78 ___std_exception_copy 39 API calls 12581->12583 12582->12581 12583->12575 12584->12569 12586 6cf13a8c 12585->12586 12587 6cf13a7e 12585->12587 12588 6cf14533 __dosmaperr 14 API calls 12586->12588 12587->12586 12592 6cf13aa4 12587->12592 12589 6cf13a94 12588->12589 12591 6cf12b78 ___std_exception_copy 39 API calls 12589->12591 12590 6cf13a9e 12590->12162 12591->12590 12592->12590 12593 6cf14533 __dosmaperr 14 API calls 12592->12593 12593->12589 12595 6cf13637 12594->12595 12596 6cf13666 12594->12596 12595->12163 12597 6cf1367d 12596->12597 12598 6cf14410 ___free_lconv_mon 14 API calls 12596->12598 12599 6cf14410 ___free_lconv_mon 14 API calls 12597->12599 12598->12596 12599->12595
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$Memory$Write$AllocThreadVirtualWindow$CloseContextHandle$ConsoleReadShowWow64$CreateResume
                                                                                                          • String ID: 5mvY$6k"$;92g$;92g$@$A{t$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$Je`x$Je`x$MZx$^,R$^,R$kernel32.dll$ntdll.dll$#6$#6
                                                                                                          • API String ID: 540769266-745060189
                                                                                                          • Opcode ID: 95e6b0f79c615e5c790667faf069f966eebdfb2e6fff72d9dd4f3db1460cf68e
                                                                                                          • Instruction ID: fc4923293f500b422559485d25e488383a940f82d29084715616ba6d7b05051f
                                                                                                          • Opcode Fuzzy Hash: 95e6b0f79c615e5c790667faf069f966eebdfb2e6fff72d9dd4f3db1460cf68e
                                                                                                          • Instruction Fuzzy Hash: E9E3F536B442148FCB15CE3CC9A47DA7BF1AB4B314F208199D42DDBB94CA369E4A9F41

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1309 6cef9710-6cef976d 1310 6cef9777-6cef9788 1309->1310 1311 6cef978e-6cef979e 1310->1311 1312 6cef9fa7-6cef9fc0 1310->1312 1315 6cefa297-6cefa2a1 1311->1315 1316 6cef97a4-6cef97b4 1311->1316 1313 6cefa7bc 1312->1313 1313->1310 1315->1313 1318 6cefa7af-6cefa7b2 1316->1318 1319 6cef97ba-6cef97ca 1316->1319 1318->1313 1321 6cefa312-6cefa330 1319->1321 1322 6cef97d0-6cef97e0 1319->1322 1321->1313 1324 6cefa1cf-6cefa21b 1322->1324 1325 6cef97e6-6cef97f6 1322->1325 1324->1313 1327 6cefa06c-6cefa0dd 1325->1327 1328 6cef97fc-6cef980c 1325->1328 1327->1313 1330 6cef9c29-6cef9ce6 1328->1330 1331 6cef9812-6cef9822 1328->1331 1330->1313 1333 6cefa6ad-6cefa6cb CloseHandle 1331->1333 1334 6cef9828-6cef9838 1331->1334 1333->1313 1336 6cef983e-6cef984e 1334->1336 1337 6cef9e13-6cef9e8c K32GetModuleInformation 1334->1337 1339 6cef9fc5-6cef9fd7 1336->1339 1340 6cef9854-6cef9864 1336->1340 1337->1313 1339->1313 1342 6cefa44e-6cefa509 VirtualProtect 1340->1342 1343 6cef986a-6cef987a 1340->1343 1342->1313 1345 6cefa6f0-6cefa72c K32GetModuleInformation 1343->1345 1346 6cef9880-6cef9890 1343->1346 1345->1313 1348 6cefa57b-6cefa5ec 1346->1348 1349 6cef9896-6cef98a6 1346->1349 1348->1313 1351 6cefa75e-6cefa7aa VirtualProtect 1349->1351 1352 6cef98ac-6cef98bc 1349->1352 1351->1313 1354 6cef98c2-6cef98d2 1352->1354 1355 6cefa2c1-6cefa30d call 6cf127e0 1352->1355 1359 6cefa56c-6cefa576 1354->1359 1360 6cef98d8-6cef98e8 1354->1360 1355->1313 1359->1313 1362 6cef98ee-6cef98fe 1360->1362 1363 6cefa5f1-6cefa66a 1360->1363 1365 6cefa1ac-6cefa1ca 1362->1365 1366 6cef9904-6cef9914 1362->1366 1363->1313 1365->1313 1368 6cef9cfa-6cef9d81 GetCurrentProcess call 6cf0ee80 GetModuleHandleA 1366->1368 1369 6cef991a-6cef992a 1366->1369 1368->1313 1372 6cef9f43-6cef9f8b CreateFileMappingA 1369->1372 1373 6cef9930-6cef9940 1369->1373 1372->1313 1376 6cef9946-6cef9956 1373->1376 1377 6cefa171-6cefa18f 1373->1377 1379 6cef995c-6cef996c 1376->1379 1380 6cef9d86-6cef9d9f 1376->1380 1377->1313 1382 6cef9972-6cef9982 1379->1382 1383 6cefa6e1-6cefa6eb 1379->1383 1380->1313 1385 6cef9ffa-6cefa004 1382->1385 1386 6cef9988-6cef9998 1382->1386 1383->1313 1385->1313 1388 6cef999e-6cef99ae 1386->1388 1389 6cefa51d-6cefa527 1386->1389 1391 6cefa50e-6cefa518 1388->1391 1392 6cef99b4-6cef99c4 1388->1392 1389->1313 1391->1313 1394 6cef99ca-6cef99da 1392->1394 1395 6cefa009-6cefa067 MapViewOfFile 1392->1395 1397 6cefa67e-6cefa6a8 CloseHandle * 2 1394->1397 1398 6cef99e0-6cef99f0 1394->1398 1395->1313 1397->1313 1400 6cef99f6-6cef9a06 1398->1400 1401 6cefa220-6cefa292 1398->1401 1403 6cef9a0c-6cef9a1c 1400->1403 1404 6cef9bfa-6cef9c24 1400->1404 1401->1313 1406 6cefa335-6cefa3b6 VirtualProtect call 6cf0efe0 1403->1406 1407 6cef9a22-6cef9a32 1403->1407 1404->1313 1410 6cefa3bb-6cefa3db 1406->1410 1411 6cef9a38-6cef9a48 1407->1411 1412 6cefa731-6cefa744 1407->1412 1410->1313 1414 6cef9a4e-6cef9a5e 1411->1414 1415 6cefa143-6cefa14d 1411->1415 1412->1313 1417 6cef9da4-6cef9dae 1414->1417 1418 6cef9a64-6cef9a74 1414->1418 1415->1313 1417->1313 1420 6cef9a7a-6cef9a8a 1418->1420 1421 6cef9e91-6cef9e9b 1418->1421 1423 6cefa6d0-6cefa6e0 call 6cf0e0e0 1420->1423 1424 6cef9a90-6cef9aa0 1420->1424 1421->1313 1427 6cef9ceb-6cef9cf5 1424->1427 1428 6cef9aa6-6cef9ab6 1424->1428 1427->1313 1431 6cef9abc-6cef9acc 1428->1431 1432 6cefa545-6cefa567 1428->1432 1434 6cef9fdc-6cef9ff5 CloseHandle 1431->1434 1435 6cef9ad2-6cef9ae2 1431->1435 1432->1313 1434->1313 1437 6cefa52c-6cefa540 1435->1437 1438 6cef9ae8-6cef9af8 1435->1438 1437->1313 1440 6cef9afe-6cef9b0e 1438->1440 1441 6cefa2a6-6cefa2bc 1438->1441 1443 6cefa194-6cefa1a7 1440->1443 1444 6cef9b14-6cef9b24 1440->1444 1441->1313 1443->1313 1446 6cef9b2a-6cef9b3a 1444->1446 1447 6cefa152-6cefa16c 1444->1447 1449 6cef9ea0-6cef9f2f GetModuleFileNameA CreateFileA 1446->1449 1450 6cef9b40-6cef9b50 1446->1450 1447->1313 1449->1313 1452 6cef9b56-6cef9b66 1450->1452 1453 6cefa0e2-6cefa13e 1450->1453 1455 6cef9b6c-6cef9b7c 1452->1455 1456 6cef9db3-6cef9dc5 1452->1456 1453->1313 1458 6cef9f34-6cef9f3e 1455->1458 1459 6cef9b82-6cef9b92 1455->1459 1456->1313 1458->1313 1461 6cefa66f-6cefa679 1459->1461 1462 6cef9b98-6cef9ba8 1459->1462 1461->1313 1464 6cef9bae-6cef9bbe 1462->1464 1465 6cef9f90-6cef9fa2 1462->1465 1467 6cef9dca-6cef9e0e 1464->1467 1468 6cef9bc4-6cef9bd4 1464->1468 1465->1313 1467->1313 1470 6cef9bda-6cef9bea 1468->1470 1471 6cefa3e0-6cefa449 1468->1471 1473 6cefa749-6cefa759 1470->1473 1474 6cef9bf0-6cef9bf5 1470->1474 1471->1313 1473->1313 1474->1313
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseFileHandle$CreateModuleNameProtectViewVirtual
                                                                                                          • String ID: @$n$0P>
                                                                                                          • API String ID: 3065440886-2576488133
                                                                                                          • Opcode ID: a980bf64260b600276da58dc4648c980b0bb19163e28b91143828be9aa489680
                                                                                                          • Instruction ID: 39d50280e4461cc6d419948f66a077c119bc30b4679cbca7bb8e4a3d5afb96c0
                                                                                                          • Opcode Fuzzy Hash: a980bf64260b600276da58dc4648c980b0bb19163e28b91143828be9aa489680
                                                                                                          • Instruction Fuzzy Hash: 6C92F8B5E54214CFDB04CF7CC985B9DBBF1AB0A304F208199E869EB795C6349E4A8F41

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1552 6cefaeb0-6cefaec8 1553 6cefaecf-6cefaeda 1552->1553 1554 6cefb25b-6cefb2a4 1553->1554 1555 6cefaee0-6cefaeed 1553->1555 1557 6cefb39c 1554->1557 1558 6cefb2b5-6cefb2fe 1555->1558 1559 6cefaef3-6cefaf00 1555->1559 1557->1553 1558->1557 1561 6cefb389-6cefb390 1559->1561 1562 6cefaf06-6cefaf13 1559->1562 1561->1557 1564 6cefb1dd-6cefb1eb 1562->1564 1565 6cefaf19-6cefaf26 1562->1565 1564->1557 1567 6cefb37d-6cefb384 1565->1567 1568 6cefaf2c-6cefaf39 1565->1568 1567->1557 1570 6cefaf3f-6cefaf4c 1568->1570 1571 6cefb1ad-6cefb1b4 1568->1571 1573 6cefb357-6cefb35e 1570->1573 1574 6cefaf52-6cefaf5f 1570->1574 1571->1557 1573->1557 1576 6cefaf65-6cefaf72 1574->1576 1577 6cefb1f0-6cefb256 1574->1577 1579 6cefaf78-6cefaf85 1576->1579 1580 6cefb363-6cefb37c call 6cf0e0e0 1576->1580 1577->1557 1583 6cefaf8b-6cefaf98 1579->1583 1584 6cefb303-6cefb352 1579->1584 1587 6cefaf9e-6cefafab 1583->1587 1588 6cefb02d-6cefb0a1 GetModuleHandleW call 6cefa7d0 call 6cf0ee80 1583->1588 1584->1557 1591 6cefb395 1587->1591 1592 6cefafb1-6cefafbe 1587->1592 1588->1557 1591->1557 1596 6cefb0a6-6cefb0e9 NtQueryInformationProcess 1592->1596 1597 6cefafc4-6cefafd1 1592->1597 1596->1557 1600 6cefb1cb-6cefb1d8 1597->1600 1601 6cefafd7-6cefafe4 1597->1601 1600->1557 1603 6cefafea-6cefaff7 1601->1603 1604 6cefb134-6cefb1a8 1601->1604 1606 6cefaffd-6cefb00a 1603->1606 1607 6cefb1b9-6cefb1c6 1603->1607 1604->1557 1609 6cefb2a9-6cefb2b0 1606->1609 1610 6cefb010-6cefb01d 1606->1610 1607->1557 1609->1557 1612 6cefb0ee-6cefb12f 1610->1612 1613 6cefb023-6cefb028 1610->1613 1612->1557 1613->1557
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(?), ref: 6CEFB045
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleModule
                                                                                                          • String ID: NtQueryInformationProcess$ntdll.dll
                                                                                                          • API String ID: 4139908857-2906145389
                                                                                                          • Opcode ID: f72d7f59f41388b09c31b3cccfe96a7e29e6bea4a2a8708647d09f36e5f99511
                                                                                                          • Instruction ID: 71ef5e2f18703728b959dce631ea958d70f11e1d1fd5b2ed28846487a7ea27de
                                                                                                          • Opcode Fuzzy Hash: f72d7f59f41388b09c31b3cccfe96a7e29e6bea4a2a8708647d09f36e5f99511
                                                                                                          • Instruction Fuzzy Hash: 5FC1CE72E852048FCB04CFBCD4917DEBBF2AB4A314F34851AE425EBB54D675894B8B01

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1476 6cf0e2ae-6cf0e2c1 call 6cf0eb60 1479 6cf0e2c3-6cf0e2c5 1476->1479 1480 6cf0e2c7-6cf0e2e9 call 6cf0e748 1476->1480 1482 6cf0e330-6cf0e33f 1479->1482 1484 6cf0e356-6cf0e36f call 6cf0e9e2 call 6cf0eb60 1480->1484 1485 6cf0e2eb-6cf0e32e call 6cf0e813 call 6cf0e6cf call 6cf0eb2b call 6cf0e343 call 6cf0e9b4 call 6cf0e350 1480->1485 1496 6cf0e380-6cf0e387 1484->1496 1497 6cf0e371-6cf0e377 1484->1497 1485->1482 1500 6cf0e393-6cf0e3a7 dllmain_raw 1496->1500 1501 6cf0e389-6cf0e38c 1496->1501 1497->1496 1499 6cf0e379-6cf0e37b 1497->1499 1503 6cf0e459-6cf0e468 1499->1503 1506 6cf0e450-6cf0e457 1500->1506 1507 6cf0e3ad-6cf0e3be dllmain_crt_dispatch 1500->1507 1501->1500 1504 6cf0e38e-6cf0e391 1501->1504 1508 6cf0e3c4-6cf0e3d6 call 6cf036f0 1504->1508 1506->1503 1507->1506 1507->1508 1514 6cf0e3d8-6cf0e3da 1508->1514 1515 6cf0e3ff-6cf0e401 1508->1515 1514->1515 1517 6cf0e3dc-6cf0e3fa call 6cf036f0 call 6cf0e2ae dllmain_raw 1514->1517 1518 6cf0e403-6cf0e406 1515->1518 1519 6cf0e408-6cf0e419 dllmain_crt_dispatch 1515->1519 1517->1515 1518->1506 1518->1519 1519->1506 1521 6cf0e41b-6cf0e44d dllmain_raw 1519->1521 1521->1506
                                                                                                          APIs
                                                                                                          • __RTC_Initialize.LIBCMT ref: 6CF0E2F5
                                                                                                          • ___scrt_uninitialize_crt.LIBCMT ref: 6CF0E30F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Initialize___scrt_uninitialize_crt
                                                                                                          • String ID:
                                                                                                          • API String ID: 2442719207-0
                                                                                                          • Opcode ID: b69bcff7d31841e783ecbab59c7cf0c220f8f94822fe9e0bb8646acf60e3c68e
                                                                                                          • Instruction ID: 1bf455aec3424a853b7ad24230921ea0c5ee99a46bbb106e6cab3f90b16c60fc
                                                                                                          • Opcode Fuzzy Hash: b69bcff7d31841e783ecbab59c7cf0c220f8f94822fe9e0bb8646acf60e3c68e
                                                                                                          • Instruction Fuzzy Hash: 5D41E276F00628EBDF118F95C850BAE3FB4EB81F58F20451AE8A567B40C7344D09ABE0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1526 6cf0e35e-6cf0e36f call 6cf0eb60 1529 6cf0e380-6cf0e387 1526->1529 1530 6cf0e371-6cf0e377 1526->1530 1532 6cf0e393-6cf0e3a7 dllmain_raw 1529->1532 1533 6cf0e389-6cf0e38c 1529->1533 1530->1529 1531 6cf0e379-6cf0e37b 1530->1531 1534 6cf0e459-6cf0e468 1531->1534 1536 6cf0e450-6cf0e457 1532->1536 1537 6cf0e3ad-6cf0e3be dllmain_crt_dispatch 1532->1537 1533->1532 1535 6cf0e38e-6cf0e391 1533->1535 1538 6cf0e3c4-6cf0e3d6 call 6cf036f0 1535->1538 1536->1534 1537->1536 1537->1538 1541 6cf0e3d8-6cf0e3da 1538->1541 1542 6cf0e3ff-6cf0e401 1538->1542 1541->1542 1543 6cf0e3dc-6cf0e3fa call 6cf036f0 call 6cf0e2ae dllmain_raw 1541->1543 1544 6cf0e403-6cf0e406 1542->1544 1545 6cf0e408-6cf0e419 dllmain_crt_dispatch 1542->1545 1543->1542 1544->1536 1544->1545 1545->1536 1547 6cf0e41b-6cf0e44d dllmain_raw 1545->1547 1547->1536
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                                          • String ID:
                                                                                                          • API String ID: 3136044242-0
                                                                                                          • Opcode ID: b376c172e7dbe267ce2f15173609e1d668150bea140ba1cb98fae1a0e5393daf
                                                                                                          • Instruction ID: 90e3c065948433550a6ce7581ba36557e5cad00c2fafecad9d56e6bbe4ed3b98
                                                                                                          • Opcode Fuzzy Hash: b376c172e7dbe267ce2f15173609e1d668150bea140ba1cb98fae1a0e5393daf
                                                                                                          • Instruction Fuzzy Hash: 0321807AF01219ABDB218E55C850AAF3E79DB81F98B114519F8A467750C3308D45ABE0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1615 6cf0e1a7-6cf0e1b5 call 6cf0eb60 call 6cf0e843 1619 6cf0e1ba-6cf0e1bd 1615->1619 1620 6cf0e1c3-6cf0e1db call 6cf0e748 1619->1620 1621 6cf0e294 1619->1621 1625 6cf0e1e1-6cf0e1f2 call 6cf0e7a5 1620->1625 1626 6cf0e2a6-6cf0e2ad call 6cf0e9e2 1620->1626 1623 6cf0e296-6cf0e2a5 1621->1623 1631 6cf0e241-6cf0e24f call 6cf0e28a 1625->1631 1632 6cf0e1f4-6cf0e216 call 6cf0eaff call 6cf0e6c3 call 6cf0e6e7 call 6cf12d69 1625->1632 1631->1621 1637 6cf0e251-6cf0e25b call 6cf0e9dc 1631->1637 1632->1631 1651 6cf0e218-6cf0e21f call 6cf0e77a 1632->1651 1644 6cf0e27c-6cf0e285 1637->1644 1645 6cf0e25d-6cf0e266 call 6cf0e903 1637->1645 1644->1623 1645->1644 1650 6cf0e268-6cf0e27a 1645->1650 1650->1644 1651->1631 1655 6cf0e221-6cf0e23e call 6cf12d3e 1651->1655 1655->1631
                                                                                                          APIs
                                                                                                          • __RTC_Initialize.LIBCMT ref: 6CF0E1F4
                                                                                                            • Part of subcall function 6CF0E6C3: InitializeSListHead.KERNEL32(6CF78AC0,6CF0E1FE,6CF21F40,00000010,6CF0E18F,?,?,?,6CF0E3B7,?,00000001,?,?,00000001,?,6CF21F88), ref: 6CF0E6C8
                                                                                                          • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CF0E25E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                                          • String ID:
                                                                                                          • API String ID: 3231365870-0
                                                                                                          • Opcode ID: f289a5fafbc8311bedf598b2848bb88120ce796203ec888aa24c0ef8618175dd
                                                                                                          • Instruction ID: 9069531d1a453ba050e238d53c93acbd1cd936f1a552add35c7ab8893624da7b
                                                                                                          • Opcode Fuzzy Hash: f289a5fafbc8311bedf598b2848bb88120ce796203ec888aa24c0ef8618175dd
                                                                                                          • Instruction Fuzzy Hash: 2E21FD72B992159FEF15ABB4D8217DD37A19F07A2CF24082AD4D177FC1CB320448A6E6

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1658 6cf160c1-6cf160c6 1659 6cf160c8-6cf160e0 1658->1659 1660 6cf160e2-6cf160e6 1659->1660 1661 6cf160ee-6cf160f7 1659->1661 1660->1661 1662 6cf160e8-6cf160ec 1660->1662 1663 6cf16109 1661->1663 1664 6cf160f9-6cf160fc 1661->1664 1665 6cf16163-6cf16167 1662->1665 1668 6cf1610b-6cf16118 GetStdHandle 1663->1668 1666 6cf16105-6cf16107 1664->1666 1667 6cf160fe-6cf16103 1664->1667 1665->1659 1669 6cf1616d-6cf16170 1665->1669 1666->1668 1667->1668 1670 6cf16145-6cf16157 1668->1670 1671 6cf1611a-6cf1611c 1668->1671 1670->1665 1672 6cf16159-6cf1615c 1670->1672 1671->1670 1673 6cf1611e-6cf16127 GetFileType 1671->1673 1672->1665 1673->1670 1674 6cf16129-6cf16132 1673->1674 1675 6cf16134-6cf16138 1674->1675 1676 6cf1613a-6cf1613d 1674->1676 1675->1665 1676->1665 1677 6cf1613f-6cf16143 1676->1677 1677->1665
                                                                                                          APIs
                                                                                                          • GetStdHandle.KERNEL32(000000F6), ref: 6CF1610D
                                                                                                          • GetFileType.KERNELBASE(00000000), ref: 6CF1611F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileHandleType
                                                                                                          • String ID:
                                                                                                          • API String ID: 3000768030-0
                                                                                                          • Opcode ID: 6a1840a1bf8f00dcde0710962bbb5e7ca63dca95bb02df36c451c15d2d345220
                                                                                                          • Instruction ID: bcca325eada192957f26e1820efd7d7ff6d2f750a46b204171e77ebb0b182fe7
                                                                                                          • Opcode Fuzzy Hash: 6a1840a1bf8f00dcde0710962bbb5e7ca63dca95bb02df36c451c15d2d345220
                                                                                                          • Instruction Fuzzy Hash: 5811B17260CB514ACB304E3E8C88713BAA5EB57638B36071AF0B6E7DE2C771D4869240
                                                                                                          Strings
                                                                                                          • fyxdyweuqtmbxdrtoekkzywkzbcitrllnchvpyhvgxigahbkuzhpqppqxsjcmtgdrsnkwnniwtxksfdnzkbrbwxlxoetochjz, xrefs: 6CEF86A9, 6CEF86C9, 6CEF86DD
                                                                                                          • nqlynzhwzvvzwnxydszwdrwjxsimpufoztvoxytupzudlummmamnvkzlyadypmqx, xrefs: 6CEF8686
                                                                                                          • ayopkxaheqqbqvgquvuculivqllhnhuowbkzfuowztpmknpiphgtlurgioxmwtobr, xrefs: 6CEF8663
                                                                                                          • #)}, xrefs: 6CEF8A34
                                                                                                          • #)}, xrefs: 6CEF894D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: #)}$#)}$ayopkxaheqqbqvgquvuculivqllhnhuowbkzfuowztpmknpiphgtlurgioxmwtobr$fyxdyweuqtmbxdrtoekkzywkzbcitrllnchvpyhvgxigahbkuzhpqppqxsjcmtgdrsnkwnniwtxksfdnzkbrbwxlxoetochjz$nqlynzhwzvvzwnxydszwdrwjxsimpufoztvoxytupzudlummmamnvkzlyadypmqx
                                                                                                          • API String ID: 0-3592044891
                                                                                                          • Opcode ID: 273ba8f3115fec5f372902ebcd04c6e7ba690d5450d7830fcb9235946718d39d
                                                                                                          • Instruction ID: 42a30348a82723eadf77001796a86bd593f373027b330b3f01b1f2e0bbdb4590
                                                                                                          • Opcode Fuzzy Hash: 273ba8f3115fec5f372902ebcd04c6e7ba690d5450d7830fcb9235946718d39d
                                                                                                          • Instruction Fuzzy Hash: 6E02BB71614B408FC724CE3DC5C169ABBF2EB57354B208A1ED4A78BF90D635E90B8B81
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: /"Q"$B7:8$B7:8$L{S$L{S
                                                                                                          • API String ID: 0-2017179303
                                                                                                          • Opcode ID: 77369ecc4f6eedc42a858ff0f81b3d40b5799172f1672b9a4364c770b5aae143
                                                                                                          • Instruction ID: a3f6c5291e4d6722dcac46c3e7141d660e3ca749d3ab3359f60d2b23e435c231
                                                                                                          • Opcode Fuzzy Hash: 77369ecc4f6eedc42a858ff0f81b3d40b5799172f1672b9a4364c770b5aae143
                                                                                                          • Instruction Fuzzy Hash: 15E10FB7B56105DFCB04CEACEAE47CE7BF2AB46B48F204116F810D7B58D6298A44DB44
                                                                                                          APIs
                                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6CF0E9EE
                                                                                                          • IsDebuggerPresent.KERNEL32 ref: 6CF0EABA
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CF0EAD3
                                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 6CF0EADD
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                          • String ID:
                                                                                                          • API String ID: 254469556-0
                                                                                                          • Opcode ID: 36cc418c7c3ad504c9de8f33028b63b93aef45b78fd2540d77d0a1003b851531
                                                                                                          • Instruction ID: b5f826e93bf99dd05aec3b36097a9b7bf5ac96fcef910a6ac05d1e1ce86df736
                                                                                                          • Opcode Fuzzy Hash: 36cc418c7c3ad504c9de8f33028b63b93aef45b78fd2540d77d0a1003b851531
                                                                                                          • Instruction Fuzzy Hash: 5C310875E05228DBDF60DFA4C9497CDBBB8BF08704F1041AAE44CAB240EB709A84DF85
                                                                                                          Strings
                                                                                                          • jfbwdbkpqbwyaothubqkevjuzzrcwlfuqckhwpdqnabwaxciahmdokqbmpdxxpdwkfaford, xrefs: 6CEF5F5F, 6CEF635B
                                                                                                          • ]}U1, xrefs: 6CEF5ACA
                                                                                                          • baAs, xrefs: 6CEF62BA
                                                                                                          • oLy+Or7EnH/xqpuoz3NnYpLInrrArRjIvLyCrIy4vL6KqRzcwMN8wuCswGjdvLR+qbyCrOy8vL/xUcS8uLy+kbKerKjMxMDDv9Gm9O6WqQTcwMKKiQTcwMGmqMzEwMA9EECB53i4geW9EIvRpvCJpqyozMTAwD+/0bblArG4tpS6rb7pS3DC4K6KqMzcwMN/ZoqozMTAw38Uu3EedEC8v3DC4K6KqMzIwMNnf2aKqMzEwMN/ZMHgTLS8v3EcIBi8vrGv, xrefs: 6CEF5BCE, 6CEF60AD, 6CEF63B9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ]}U1$baAs$jfbwdbkpqbwyaothubqkevjuzzrcwlfuqckhwpdqnabwaxciahmdokqbmpdxxpdwkfaford$oLy+Or7EnH/xqpuoz3NnYpLInrrArRjIvLyCrIy4vL6KqRzcwMN8wuCswGjdvLR+qbyCrOy8vL/xUcS8uLy+kbKerKjMxMDDv9Gm9O6WqQTcwMKKiQTcwMGmqMzEwMA9EECB53i4geW9EIvRpvCJpqyozMTAwD+/0bblArG4tpS6rb7pS3DC4K6KqMzcwMN/ZoqozMTAw38Uu3EedEC8v3DC4K6KqMzIwMNnf2aKqMzEwMN/ZMHgTLS8v3EcIBi8vrGv
                                                                                                          • API String ID: 0-4091479763
                                                                                                          • Opcode ID: e249c023c22bebd099bc108f496ee447cd44b9b825bc64c55a964dfd029e323a
                                                                                                          • Instruction ID: 9057e8826284ccc60f9d850469b08dbe1a4bf8d6da0c3d3ff4673c3fa75b70c6
                                                                                                          • Opcode Fuzzy Hash: e249c023c22bebd099bc108f496ee447cd44b9b825bc64c55a964dfd029e323a
                                                                                                          • Instruction Fuzzy Hash: B832E272712B008FD725CE3CD69538A77F5AB97318B208A1DD466CBF90D635E90ACB21
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 3[/$3[/$8/)B$8/)B
                                                                                                          • API String ID: 0-315528896
                                                                                                          • Opcode ID: 8ef5156daa3a4a655c2f80072a8ce7c5a02470b4f7f2c42a0c4ef27816520379
                                                                                                          • Instruction ID: 4603af4c30aeda61a6e54a9d7d98cf7c9cc5e795c586bedae2718e9fba771cf9
                                                                                                          • Opcode Fuzzy Hash: 8ef5156daa3a4a655c2f80072a8ce7c5a02470b4f7f2c42a0c4ef27816520379
                                                                                                          • Instruction Fuzzy Hash: 4DE12477B111008FCF04DE7CD5A53CE7BF2AB4A755F208519E851EBB90C63A8909DB22
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ! tW$bukfcetqpjtzyprfeajkvtvzsahkhndrnmexdqsnaqukpmavakuqftposjiohbygiixmrvfhlmpddgcrpvtsatuwzugyzrlh$ijbnehanuaurxhiuilupaumuqrczubalolkhdgtujbriwiyqxpnucqiyjdfwrcfhcpzugz$lhadsxxbflctrzmykmoqqeoaycfagtljbcqpelntpvgfumkgzuyqiqgujutwj
                                                                                                          • API String ID: 0-4273801489
                                                                                                          • Opcode ID: e463d7cf87974242398097f36bb1b7790a46356621111d664b7ec34cbe5f0dff
                                                                                                          • Instruction ID: 27dd9c0acd6ee2a14573a9f89415371599ff9692cd18c1ce477a2fd34481d5ca
                                                                                                          • Opcode Fuzzy Hash: e463d7cf87974242398097f36bb1b7790a46356621111d664b7ec34cbe5f0dff
                                                                                                          • Instruction Fuzzy Hash: 5FE103B1614B40CFCB24DF7CC595656BBF1AB5A708B204A2EC4A687F54D734F90ACB42
                                                                                                          Strings
                                                                                                          • ,Z8k, xrefs: 6CEF592B
                                                                                                          • AgJ+DHIjQwAgeHSgwAYgfECgQwINXqhqGuJzyHHMciNBHj+wIiEHGZA6fVDTYH7qr8WCnW1x0QkGAUEUF7HRCQcBABSUsdEJCAFUEpXx0QkJDMmLyrHRCQoMjMvcsdEJCxZRw04x0QkMD41Jz3HRCQ0KGAaPsdEJDgjISUgx0QkPDUhNyjHRCRALmN6NcdEJEQTFxNSx0QkSAwAHgLHRCRMV00YDsdEJFAdBC9JxkQkVHTHRCRVAAAAAMdEJFgAAAAAu, xrefs: 6CEF56B5, 6CEF58E2
                                                                                                          • C, xrefs: 6CEF57C2
                                                                                                          • oddzcpehfgdmfk, xrefs: 6CEF59FF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ,Z8k$AgJ+DHIjQwAgeHSgwAYgfECgQwINXqhqGuJzyHHMciNBHj+wIiEHGZA6fVDTYH7qr8WCnW1x0QkGAUEUF7HRCQcBABSUsdEJCAFUEpXx0QkJDMmLyrHRCQoMjMvcsdEJCxZRw04x0QkMD41Jz3HRCQ0KGAaPsdEJDgjISUgx0QkPDUhNyjHRCRALmN6NcdEJEQTFxNSx0QkSAwAHgLHRCRMV00YDsdEJFAdBC9JxkQkVHTHRCRVAAAAAMdEJFgAAAAAu$C$oddzcpehfgdmfk
                                                                                                          • API String ID: 0-366193392
                                                                                                          • Opcode ID: e5e9f5b3b321b6d817ef19958ae685881f02235fa3e757e25c6de4a4855293f1
                                                                                                          • Instruction ID: 9dbbee02c183a5dcfabba2bc91bdf5dea083f298a9db2fa898d15f844a6eebb3
                                                                                                          • Opcode Fuzzy Hash: e5e9f5b3b321b6d817ef19958ae685881f02235fa3e757e25c6de4a4855293f1
                                                                                                          • Instruction Fuzzy Hash: ADA1D272A56645CFCB04CEACD5D43DE7BF2BB63328F34921AD4349BB94D6254A078B01
                                                                                                          APIs
                                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CF12A74
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CF12A7E
                                                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CF12A8B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                          • String ID:
                                                                                                          • API String ID: 3906539128-0
                                                                                                          • Opcode ID: e07d44529d2debd9cdeab84fae470ca1d97fab36033cff3d9e518b838a71e7ed
                                                                                                          • Instruction ID: 7f82a487feaba8a57ebceb061f794bed04cd576d005f659426949d9516eded8b
                                                                                                          • Opcode Fuzzy Hash: e07d44529d2debd9cdeab84fae470ca1d97fab36033cff3d9e518b838a71e7ed
                                                                                                          • Instruction Fuzzy Hash: 4531E374E1122C9BCB21DF68D8887CDBBB8BF08714F5042EAE41CA7650EB709B858F44
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: o6<<$o6<<
                                                                                                          • API String ID: 0-292878874
                                                                                                          • Opcode ID: ff720ff36198df7a86686c19cfe0c6222fd3bf2af7b497fefa06018417875115
                                                                                                          • Instruction ID: 559c2046bc7507bb9fcfb0b26d3f997a26e5b2c013b96aa48f620daa4196691b
                                                                                                          • Opcode Fuzzy Hash: ff720ff36198df7a86686c19cfe0c6222fd3bf2af7b497fefa06018417875115
                                                                                                          • Instruction Fuzzy Hash: 6C320436F551009FCB09CEBCE5E47DE77F2AB46724F219619E421DBBA4C6298D09EB00
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: Unknown exception$wz1
                                                                                                          • API String ID: 0-3635849324
                                                                                                          • Opcode ID: 3897833ea7bac1fbc3616ae3f56e6f138b6ef2b9632c6ba1cc30448f20639b2b
                                                                                                          • Instruction ID: 3154868aa6234eaf5c2c3696ae44bf801db8be96dcea3aa6f43b70ab3aed6b91
                                                                                                          • Opcode Fuzzy Hash: 3897833ea7bac1fbc3616ae3f56e6f138b6ef2b9632c6ba1cc30448f20639b2b
                                                                                                          • Instruction Fuzzy Hash: A2E1F336F502058FCF04DE7CD5E83DE7BF2BB0A324F119119D911ABB94C62A4909AB65
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 9C#^$9C#^
                                                                                                          • API String ID: 0-4070370123
                                                                                                          • Opcode ID: 6183525682befa1fbb0ff6eb891362f34cd4770bad131c85f55a2f1f59a04f0e
                                                                                                          • Instruction ID: 366f0dd64542be0730e10f153b2794f5c478833da70e6d3b40283c86dc299bef
                                                                                                          • Opcode Fuzzy Hash: 6183525682befa1fbb0ff6eb891362f34cd4770bad131c85f55a2f1f59a04f0e
                                                                                                          • Instruction Fuzzy Hash: 9BD1C172B466158FCB08DE7CD5E57CE77F3AB4A721F205116E811ABB90C62A8E05DB10
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ~(K$~(K
                                                                                                          • API String ID: 0-4076149878
                                                                                                          • Opcode ID: 21616cd74b169971d4b8683d976ce49b068b9008e007a113713f9adfe7d0d4f0
                                                                                                          • Instruction ID: bd7cfa9bb4fe648f4378c95c0eafbd5aaccb523b2c93d03ff1e7ccf8203fd0ab
                                                                                                          • Opcode Fuzzy Hash: 21616cd74b169971d4b8683d976ce49b068b9008e007a113713f9adfe7d0d4f0
                                                                                                          • Instruction Fuzzy Hash: 3C719B72B502158FCF058EBCD9A4BDEBBF6BB4A760F20415AD811EB740C73A9905DB60
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: a3r$a3r
                                                                                                          • API String ID: 0-948694567
                                                                                                          • Opcode ID: ccc738b12bb5c7fb044642aed589fbe58c9776e0c45e343e18d99c848c6791a1
                                                                                                          • Instruction ID: b74721e591c0ee45fb670d1d3a3aa70e88aab53476a065e1030c93a4212b212d
                                                                                                          • Opcode Fuzzy Hash: ccc738b12bb5c7fb044642aed589fbe58c9776e0c45e343e18d99c848c6791a1
                                                                                                          • Instruction Fuzzy Hash: 8161CFB6F452098FCF04CFACC5A57EEBBF1AB4A714F20411AE850AB791C23A9905DB51
                                                                                                          APIs
                                                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CF1ACF0,?,?,00000008,?,?,6CF1A8F3,00000000), ref: 6CF1AF22
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionRaise
                                                                                                          • String ID:
                                                                                                          • API String ID: 3997070919-0
                                                                                                          • Opcode ID: fccb45cd2390d5af6b9b64b65a2ffd984d642640a967dfa7745f13c7cbd95e38
                                                                                                          • Instruction ID: 1eb815fcc6ebb12640737068cbd5edc9720108442d9c2c70f940abe0f0dba854
                                                                                                          • Opcode Fuzzy Hash: fccb45cd2390d5af6b9b64b65a2ffd984d642640a967dfa7745f13c7cbd95e38
                                                                                                          • Instruction Fuzzy Hash: 77B18E72214608DFD705CF28C486B957BE0FF45369F258698E8A9CFAA1C335E995CB40
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: Pcc
                                                                                                          • API String ID: 0-87343699
                                                                                                          • Opcode ID: c06e6c2d481b5f4109693bd3465333ce8db38515a09978ff9ec5b2d7317f5661
                                                                                                          • Instruction ID: 3a1902d820e62d06cedf628f7e710bacb3fa9318af4c4cb03abde8744818fdb4
                                                                                                          • Opcode Fuzzy Hash: c06e6c2d481b5f4109693bd3465333ce8db38515a09978ff9ec5b2d7317f5661
                                                                                                          • Instruction Fuzzy Hash: FF12CD76F052088FCB04DFACD5A17DEBBF1AF49704F208429E809EB754D6359A48DB51
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: l8H
                                                                                                          • API String ID: 0-920087761
                                                                                                          • Opcode ID: 5f3c00207a4cce84208933aa4fbbeb9c4ba3fd6f89bf6d3f0aca8db5ecfc2395
                                                                                                          • Instruction ID: b8080aac88cd6efd9f235a06dfb34493a37ec8aa228a334e1a86f3066d9d6f39
                                                                                                          • Opcode Fuzzy Hash: 5f3c00207a4cce84208933aa4fbbeb9c4ba3fd6f89bf6d3f0aca8db5ecfc2395
                                                                                                          • Instruction Fuzzy Hash: 1F023875E843098FCB19CFACD58469CBBF1AB4A304F304529E825EFB58D6359947CB11
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 9M#}
                                                                                                          • API String ID: 0-1144523844
                                                                                                          • Opcode ID: 4c93357c7a2b62949aa4ec7a52e5abc7b78856c15057ae8a558dbbac8dcc71f5
                                                                                                          • Instruction ID: 70df6e76700b2fe1cc8b59a1c55e51acb44a86e1be03f5cc52e4892a704c5856
                                                                                                          • Opcode Fuzzy Hash: 4c93357c7a2b62949aa4ec7a52e5abc7b78856c15057ae8a558dbbac8dcc71f5
                                                                                                          • Instruction Fuzzy Hash: 4FF1253AB451259FCB04CEBCE9A47CE7BF1BB46710F10521AE811EBB64C73989459B11
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: BV+M
                                                                                                          • API String ID: 0-108387820
                                                                                                          • Opcode ID: d88418bce020a6b8cbf2dfcb93c1d6a87f869530a9973ad1ffb8a22454e7cd7f
                                                                                                          • Instruction ID: aa51ce7f08cea0488f96cd21d60b880b5949c66f811379d5f0d87967e0281910
                                                                                                          • Opcode Fuzzy Hash: d88418bce020a6b8cbf2dfcb93c1d6a87f869530a9973ad1ffb8a22454e7cd7f
                                                                                                          • Instruction Fuzzy Hash: CBE13472B152058FCF04CE7CD5E57DE7BF2AB4A760F24611AE821EBB90C23A8805DB55
                                                                                                          APIs
                                                                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CF0EBBE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FeaturePresentProcessor
                                                                                                          • String ID:
                                                                                                          • API String ID: 2325560087-0
                                                                                                          • Opcode ID: bcedef70dfef2ba50c9f151e7c60ec8457a3e4d4e2ff3a300626a04dcb386368
                                                                                                          • Instruction ID: 5540ef054719cf0911096f861a2c177a9a12eda67048493a82968b78eb13ae8e
                                                                                                          • Opcode Fuzzy Hash: bcedef70dfef2ba50c9f151e7c60ec8457a3e4d4e2ff3a300626a04dcb386368
                                                                                                          • Instruction Fuzzy Hash: 4151ADB1F266258FEB56CF58D89179EBBF1FB49708F24852AC490EB240D3759900CBA0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: %L
                                                                                                          • API String ID: 0-679821887
                                                                                                          • Opcode ID: 58277d04bc0c7572b752cbb0b2140597db44c43068832920a33fb752b05032fc
                                                                                                          • Instruction ID: b2db0b6f9c804b42ef89676372b44fa092c931ba37acae269cde4ddd39ccfd6e
                                                                                                          • Opcode Fuzzy Hash: 58277d04bc0c7572b752cbb0b2140597db44c43068832920a33fb752b05032fc
                                                                                                          • Instruction Fuzzy Hash: 16C1FC76B452058FCF04CEACD5E07DEBBF2EB0A764F205516E811E7B40D2398909EB25
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: GdO
                                                                                                          • API String ID: 0-1628042003
                                                                                                          • Opcode ID: 9cad167a91f013a7faf61d17fe7304eea7a9f5c2a940fcfb48b6bc7cc5af28d3
                                                                                                          • Instruction ID: 7a4ec23d4852c78a09d59044a66bbcc9552c58db0694c2ee0f9917c56bfbda3c
                                                                                                          • Opcode Fuzzy Hash: 9cad167a91f013a7faf61d17fe7304eea7a9f5c2a940fcfb48b6bc7cc5af28d3
                                                                                                          • Instruction Fuzzy Hash: 2A710476F401158FCF08CE7CC8F53EF7BF2AB46720F104519C8119BB94C62A8909AB68
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HeapProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 54951025-0
                                                                                                          • Opcode ID: 98b4e3e2f6a35117d41456de42efd9b930b564629785081a9811087af4d71f10
                                                                                                          • Instruction ID: 6dd464dd78e8331b0dbfd781a05d67f242686ffb8e1dfad5b40e4aea1bb29177
                                                                                                          • Opcode Fuzzy Hash: 98b4e3e2f6a35117d41456de42efd9b930b564629785081a9811087af4d71f10
                                                                                                          • Instruction Fuzzy Hash: 82A01230B112008F5BC0AF34420630836BA55065D030740259400D0010D62440409600
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: de8d0813d975cd0c15b82fb68bc3e8e27b1726504b2e47bdc80ca9bcf575f80c
                                                                                                          • Instruction ID: cb53e3a816ad6f0cf178ebb15548a0033dc77cc7644f42c9902dc8cf3f1bbc8c
                                                                                                          • Opcode Fuzzy Hash: de8d0813d975cd0c15b82fb68bc3e8e27b1726504b2e47bdc80ca9bcf575f80c
                                                                                                          • Instruction Fuzzy Hash: BC021576B445059FCF04CE6CD5E8BDE7BF2AB46720F24521DE921EBB84C639884DAB10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 68c4accdac6e23fab047fd9aab12cb197375858f893d134fe8f04f18f5370035
                                                                                                          • Instruction ID: 3e6b7144b5abb6571689a614de9a18daddf2772c97f22b02947ba874686d2fcd
                                                                                                          • Opcode Fuzzy Hash: 68c4accdac6e23fab047fd9aab12cb197375858f893d134fe8f04f18f5370035
                                                                                                          • Instruction Fuzzy Hash: 0412CC36F08205CFCF08DFACD9A16DEBBF2AB4A714F20411AE411EB754EA359A45DB01
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3d9bed9e724fcf351b766970c06a9b3d3358a7c54fe3b03815347edf29a6b15d
                                                                                                          • Instruction ID: a798028dbac40e88722d702dc2acae1f1d668a49faf342ee6346578868ea153d
                                                                                                          • Opcode Fuzzy Hash: 3d9bed9e724fcf351b766970c06a9b3d3358a7c54fe3b03815347edf29a6b15d
                                                                                                          • Instruction Fuzzy Hash: DFA13936F406118FCF08CE7CC5A53DF77F2AB0B735F245216C521ABB94D62A8A0A9B50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 0c9bea199cecdd92f0dc18de974dba4a9c0af93fdba7c0f75626f20a503d10c1
                                                                                                          • Instruction ID: b8f286b96f705a749504fa7fba46a0b5e2de7877a876280ff1e6b44becdd8eea
                                                                                                          • Opcode Fuzzy Hash: 0c9bea199cecdd92f0dc18de974dba4a9c0af93fdba7c0f75626f20a503d10c1
                                                                                                          • Instruction Fuzzy Hash: 0A91AE76B112058FDB04CF7CD8A17DEBBF2AB4A310F10806AE805A7750DA3A9909DB91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b73b227bef4adcb12d163c9ded6b01851c8873099555a4110909f3895cbd862b
                                                                                                          • Instruction ID: 2325315306f9e7c9ff44f63cf8e51d863141fd34cd1030c49c4ca83150396977
                                                                                                          • Opcode Fuzzy Hash: b73b227bef4adcb12d163c9ded6b01851c8873099555a4110909f3895cbd862b
                                                                                                          • Instruction Fuzzy Hash: BF814776F142088FCF05CEBCD5A43EF7BF2AB0A324F245119D811EB781C2669909DB28
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 239cb89f67c00d8fbe3526ebc37dafdd6cac300703cd60865f05ba67ac39e9ae
                                                                                                          • Instruction ID: 35005d78065a0be70d235bdc8daf822512364c215dbe7f17cfb94d8dce6d92a1
                                                                                                          • Opcode Fuzzy Hash: 239cb89f67c00d8fbe3526ebc37dafdd6cac300703cd60865f05ba67ac39e9ae
                                                                                                          • Instruction Fuzzy Hash: 8C712776B502458FCF05CE7CC9A53EF7BF2EB46324F209218C521AB7D0C62A8649DB61
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 13e38aa1cc4a6309ee3b8d56b6be1c9ee68e861298c612cc63469df39786085a
                                                                                                          • Instruction ID: 4f5333a93fe5babc91cb8d58e92c0964331e8a6230051ed424afbf56e36c2bd0
                                                                                                          • Opcode Fuzzy Hash: 13e38aa1cc4a6309ee3b8d56b6be1c9ee68e861298c612cc63469df39786085a
                                                                                                          • Instruction Fuzzy Hash: 2771FF76B542068FCF09CF6CD5E17DEBBF2EB4A314F204A19D810A7790C63A9A09DB54
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: cb4831b0a8ce2ab3803b35a872f6d38a72844db294ce2027f046f954ead0fc0a
                                                                                                          • Instruction ID: ae39964b96957b47ba8f9cbf4def7a89cf99edb5d95cf26d95d18d5204090a5f
                                                                                                          • Opcode Fuzzy Hash: cb4831b0a8ce2ab3803b35a872f6d38a72844db294ce2027f046f954ead0fc0a
                                                                                                          • Instruction Fuzzy Hash: 7D71CBB2B106158FCF04CEACD5E17DEBBF2AB4A320F10952AE815E7754C63A8905DB61
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5390f285112038c36213bf6555343a1a66dc03ced7ef54b8f99cb2a7eae9ecf8
                                                                                                          • Instruction ID: 4d24284d84c73e88b1d4e5dfe5d22ffb5d4c5585a9e2dd0932be32bd930fff2a
                                                                                                          • Opcode Fuzzy Hash: 5390f285112038c36213bf6555343a1a66dc03ced7ef54b8f99cb2a7eae9ecf8
                                                                                                          • Instruction Fuzzy Hash: DE61D176F441158FCF08CEBCD5A13EF7BF2AB4A324F21511AE811E7750C62A4A099B60
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 2c7f21c8b639e0d0c9e4b60d88c7b40a05fc4dbff6eaddd0d0b5d2c13557ac2d
                                                                                                          • Instruction ID: 460d21eb2ceab3562e6c5cd802c5a69652685c12a92fdd222d427f4397215a18
                                                                                                          • Opcode Fuzzy Hash: 2c7f21c8b639e0d0c9e4b60d88c7b40a05fc4dbff6eaddd0d0b5d2c13557ac2d
                                                                                                          • Instruction Fuzzy Hash: FF512573B541168FCF04CFACD8A57EF7BF1AB0A754F244519D422DBB91C62A490897A0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 87c5adf6182c2a3a0dec493bb1a930a2aff7e4df968d4c2e5ef90f47603497be
                                                                                                          • Instruction ID: c35983d9f99573ded4f67644b8ec2bd0a38ee97128e421199357bd94440caa2b
                                                                                                          • Opcode Fuzzy Hash: 87c5adf6182c2a3a0dec493bb1a930a2aff7e4df968d4c2e5ef90f47603497be
                                                                                                          • Instruction Fuzzy Hash: CE51BA72F402199FCB08CFACD4E5BEEBBF1EB0A724F245119E811AB740C2395805DB69
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 695396669b6abd2385604e61b04305938781a9481250b26adaee959420a79c5e
                                                                                                          • Instruction ID: 7afd027694be24c94a93f839f4cf4f0c25b8fa8e75673484122eefb378c2342a
                                                                                                          • Opcode Fuzzy Hash: 695396669b6abd2385604e61b04305938781a9481250b26adaee959420a79c5e
                                                                                                          • Instruction Fuzzy Hash: 2B51F472E101158FCB08CFBCD9907EEBBF2AB4A320F244219E535EBBD0D63589068B10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 93bbf4dc967704ab8f11b4219643792daadc31af6f10256b3f1bbd347ea9df3d
                                                                                                          • Instruction ID: 51e0be4dbfa9386dd7146e325ab1bb54ed18cc9720f96574cba779ec5e081e79
                                                                                                          • Opcode Fuzzy Hash: 93bbf4dc967704ab8f11b4219643792daadc31af6f10256b3f1bbd347ea9df3d
                                                                                                          • Instruction Fuzzy Hash: E951DD72F102098FDF04CFACC5A17EEBFF6AB5A718F204519D810ABB80C6365A09DB51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: cbc966171bf11b25dbe6c54d6c0465a874052c3ff6d0962d439ece3e7dd81173
                                                                                                          • Instruction ID: 4ba9a2ef20a34bf2efb4374b3f2e66760d8f830de44b9635bd6ffa5dc820cdec
                                                                                                          • Opcode Fuzzy Hash: cbc966171bf11b25dbe6c54d6c0465a874052c3ff6d0962d439ece3e7dd81173
                                                                                                          • Instruction Fuzzy Hash: 9C41E276F012158FCF04CF6CC4A57DFBBF1AB46720F20861AD8259B794C23A9946DB90
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 056e9aef5a8c249ebc9cd7f7bfb68849ec49056790c5824b2d2605f2ce001011
                                                                                                          • Instruction ID: 42cf8a02945f1ca96014a80acbe147301aecf42f222738b9f168560241e851b0
                                                                                                          • Opcode Fuzzy Hash: 056e9aef5a8c249ebc9cd7f7bfb68849ec49056790c5824b2d2605f2ce001011
                                                                                                          • Instruction Fuzzy Hash: A8416A77B411154FCF048E7CC5A53EF3FF1EB13320F245219D920ABAD4C2268A0AAB55

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1743 6cf11c5a-6cf11c85 call 6cf127a9 1746 6cf11ff9-6cf11ffe call 6cf13aca 1743->1746 1747 6cf11c8b-6cf11c8e 1743->1747 1747->1746 1749 6cf11c94-6cf11c9d 1747->1749 1751 6cf11ca3-6cf11ca7 1749->1751 1752 6cf11d9a-6cf11da0 1749->1752 1751->1752 1754 6cf11cad-6cf11cb4 1751->1754 1753 6cf11da8-6cf11db6 1752->1753 1755 6cf11f62-6cf11f65 1753->1755 1756 6cf11dbc-6cf11dc0 1753->1756 1757 6cf11cb6-6cf11cbd 1754->1757 1758 6cf11ccc-6cf11cd1 1754->1758 1759 6cf11f67-6cf11f6a 1755->1759 1760 6cf11f88-6cf11f91 call 6cf1129e 1755->1760 1756->1755 1762 6cf11dc6-6cf11dcd 1756->1762 1757->1758 1763 6cf11cbf-6cf11cc6 1757->1763 1758->1752 1761 6cf11cd7-6cf11cdf call 6cf1129e 1758->1761 1759->1746 1764 6cf11f70-6cf11f85 call 6cf11fff 1759->1764 1760->1746 1776 6cf11f93-6cf11f97 1760->1776 1761->1776 1777 6cf11ce5-6cf11cfe call 6cf1129e * 2 1761->1777 1766 6cf11de5-6cf11deb 1762->1766 1767 6cf11dcf-6cf11dd6 1762->1767 1763->1752 1763->1758 1764->1760 1772 6cf11df1-6cf11e18 call 6cf11433 1766->1772 1773 6cf11f02-6cf11f06 1766->1773 1767->1766 1771 6cf11dd8-6cf11ddf 1767->1771 1771->1755 1771->1766 1772->1773 1789 6cf11e1e-6cf11e21 1772->1789 1779 6cf11f12-6cf11f1e 1773->1779 1780 6cf11f08-6cf11f11 call 6cf10f0e 1773->1780 1777->1746 1802 6cf11d04-6cf11d0a 1777->1802 1779->1760 1781 6cf11f20-6cf11f2a 1779->1781 1780->1779 1786 6cf11f38-6cf11f3a 1781->1786 1787 6cf11f2c-6cf11f2e 1781->1787 1791 6cf11f51-6cf11f5e call 6cf12678 1786->1791 1792 6cf11f3c-6cf11f4f call 6cf1129e * 2 1786->1792 1787->1760 1790 6cf11f30-6cf11f34 1787->1790 1794 6cf11e24-6cf11e39 1789->1794 1790->1760 1795 6cf11f36 1790->1795 1810 6cf11f60 1791->1810 1811 6cf11fbd-6cf11fd2 call 6cf1129e * 2 1791->1811 1821 6cf11f98 call 6cf13a34 1792->1821 1798 6cf11ee3-6cf11ef6 1794->1798 1799 6cf11e3f-6cf11e42 1794->1799 1795->1792 1798->1794 1803 6cf11efc-6cf11eff 1798->1803 1799->1798 1804 6cf11e48-6cf11e50 1799->1804 1807 6cf11d36-6cf11d3e call 6cf1129e 1802->1807 1808 6cf11d0c-6cf11d10 1802->1808 1803->1773 1804->1798 1809 6cf11e56-6cf11e6a 1804->1809 1825 6cf11d40-6cf11d60 call 6cf1129e * 2 call 6cf12678 1807->1825 1826 6cf11da2-6cf11da5 1807->1826 1808->1807 1815 6cf11d12-6cf11d19 1808->1815 1816 6cf11e6d-6cf11e7e 1809->1816 1810->1760 1839 6cf11fd4 1811->1839 1840 6cf11fd7-6cf11ff4 call 6cf1161f call 6cf12578 call 6cf12735 call 6cf124ef 1811->1840 1822 6cf11d1b-6cf11d22 1815->1822 1823 6cf11d2d-6cf11d30 1815->1823 1817 6cf11e80-6cf11e91 call 6cf12135 1816->1817 1818 6cf11ea4-6cf11eb1 1816->1818 1836 6cf11e93-6cf11e9c 1817->1836 1837 6cf11eb5-6cf11edd call 6cf11bda 1817->1837 1818->1816 1828 6cf11eb3 1818->1828 1835 6cf11f9d-6cf11fb8 call 6cf10f0e call 6cf122e9 call 6cf0f554 1821->1835 1822->1823 1830 6cf11d24-6cf11d2b 1822->1830 1823->1746 1823->1807 1825->1826 1857 6cf11d62-6cf11d67 1825->1857 1826->1753 1834 6cf11ee0 1828->1834 1830->1807 1830->1823 1834->1798 1835->1811 1836->1817 1842 6cf11e9e-6cf11ea1 1836->1842 1837->1834 1839->1840 1840->1746 1842->1818 1857->1821 1859 6cf11d6d-6cf11d80 call 6cf12301 1857->1859 1859->1835 1864 6cf11d86-6cf11d92 1859->1864 1864->1821 1865 6cf11d98 1864->1865 1865->1859
                                                                                                          APIs
                                                                                                          • type_info::operator==.LIBVCRUNTIME ref: 6CF11D79
                                                                                                          • ___TypeMatch.LIBVCRUNTIME ref: 6CF11E87
                                                                                                          • _UnwindNestedFrames.LIBCMT ref: 6CF11FD9
                                                                                                          • CallUnexpected.LIBVCRUNTIME ref: 6CF11FF4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                                          • String ID: csm$csm$csm
                                                                                                          • API String ID: 2751267872-393685449
                                                                                                          • Opcode ID: 56f188357b577ec8ba90721201202dcce5f6cd41634ccd98e2c80ab2b9dd7704
                                                                                                          • Instruction ID: 4012790187a71407a74c36bf2c16a992c1cfd5c183fad3a59ee8aff1cb1f4907
                                                                                                          • Opcode Fuzzy Hash: 56f188357b577ec8ba90721201202dcce5f6cd41634ccd98e2c80ab2b9dd7704
                                                                                                          • Instruction Fuzzy Hash: 5FB18B72808219DFCF14CFA5D880AEEB7B5FF24318F14865AE8106BE15D331EA55CB91

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1866 6cf15c1f-6cf15c2b 1867 6cf15cbd-6cf15cc0 1866->1867 1868 6cf15c30-6cf15c41 1867->1868 1869 6cf15cc6 1867->1869 1871 6cf15c43-6cf15c46 1868->1871 1872 6cf15c4e-6cf15c67 LoadLibraryExW 1868->1872 1870 6cf15cc8-6cf15ccc 1869->1870 1873 6cf15ce6-6cf15ce8 1871->1873 1874 6cf15c4c 1871->1874 1875 6cf15c69-6cf15c72 GetLastError 1872->1875 1876 6cf15ccd-6cf15cdd 1872->1876 1873->1870 1878 6cf15cba 1874->1878 1879 6cf15c74-6cf15c86 call 6cf13bf3 1875->1879 1880 6cf15cab-6cf15cb8 1875->1880 1876->1873 1877 6cf15cdf-6cf15ce0 FreeLibrary 1876->1877 1877->1873 1878->1867 1879->1880 1883 6cf15c88-6cf15c9a call 6cf13bf3 1879->1883 1880->1878 1883->1880 1886 6cf15c9c-6cf15ca9 LoadLibraryExW 1883->1886 1886->1876 1886->1880
                                                                                                          APIs
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,6CF15D2E,00000000,6CF13827,00000000,00000000,00000001,?,6CF15EA7,00000022,FlsSetValue,6CF1E540,6CF1E548,00000000), ref: 6CF15CE0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeLibrary
                                                                                                          • String ID: api-ms-$ext-ms-
                                                                                                          • API String ID: 3664257935-537541572
                                                                                                          • Opcode ID: 292c76bd0ff59740f1d69f3f992b1d17a97ba1dda1a92c6c2180878cb4cd21df
                                                                                                          • Instruction ID: 3de88fec750236780baa2593c1f253fa69aae30e9eadb12003051c348c2b8401
                                                                                                          • Opcode Fuzzy Hash: 292c76bd0ff59740f1d69f3f992b1d17a97ba1dda1a92c6c2180878cb4cd21df
                                                                                                          • Instruction Fuzzy Hash: 8021B772E19220ABD712DF75DC45B4A3779EB423A8F260522E915B7E80E730E900C6E0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1970 6cf112ac-6cf112b3 1971 6cf112b5-6cf112b7 1970->1971 1972 6cf112b8-6cf112d3 GetLastError call 6cf11943 1970->1972 1975 6cf112d5-6cf112d7 1972->1975 1976 6cf112ec-6cf112ee 1972->1976 1977 6cf11332-6cf1133d SetLastError 1975->1977 1978 6cf112d9-6cf112ea call 6cf1197e 1975->1978 1976->1977 1978->1976 1981 6cf112f0-6cf11300 call 6cf13be8 1978->1981 1984 6cf11302-6cf11312 call 6cf1197e 1981->1984 1985 6cf11314-6cf11324 call 6cf1197e 1981->1985 1984->1985 1990 6cf11326-6cf11328 1984->1990 1991 6cf1132a-6cf11331 call 6cf12d23 1985->1991 1990->1991 1991->1977
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(00000001,?,6CF10EE1,6CF0E7B8,6CF0E17F,?,6CF0E3B7,?,00000001,?,?,00000001,?,6CF21F88,0000000C,6CF0E4B0), ref: 6CF112BA
                                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CF112C8
                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CF112E1
                                                                                                          • SetLastError.KERNEL32(00000000,6CF0E3B7,?,00000001,?,?,00000001,?,6CF21F88,0000000C,6CF0E4B0,?,00000001,?), ref: 6CF11333
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                                          • String ID:
                                                                                                          • API String ID: 3852720340-0
                                                                                                          • Opcode ID: 9142c3576d55fa4917fa77dace4ad7f16c0ff97654ad06a9ba430b95ae95904d
                                                                                                          • Instruction ID: 94228fb66957b1d0560b335a48c1d551dd9357c5f1fc160c7aaa751e4d569860
                                                                                                          • Opcode Fuzzy Hash: 9142c3576d55fa4917fa77dace4ad7f16c0ff97654ad06a9ba430b95ae95904d
                                                                                                          • Instruction Fuzzy Hash: D601D43272D2215EBA4657B56C847CB3A75DB227BCB70832AE52481ED0EFD2CC089154
                                                                                                          Strings
                                                                                                          • C:\Users\user\Desktop\Solara.exe, xrefs: 6CF14E6F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: C:\Users\user\Desktop\Solara.exe
                                                                                                          • API String ID: 0-3879318298
                                                                                                          • Opcode ID: 798f489c50deedab651a7af16efdc4445b90d08965a100f6564f121c916e6b94
                                                                                                          • Instruction ID: 68415c3f28f59baddb4bb0cc69ea3d131239655961706b3133955bd0d33c0f7c
                                                                                                          • Opcode Fuzzy Hash: 798f489c50deedab651a7af16efdc4445b90d08965a100f6564f121c916e6b94
                                                                                                          • Instruction Fuzzy Hash: 8121817260C205AFDB119FA6DC90A8B7FB9AF8576C7058614E918D7F40D731EC148BA0
                                                                                                          APIs
                                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,997DF8DE,00000000,?,00000000,6CF1B5A2,000000FF,?,6CF130EF,?,?,6CF130C3,?), ref: 6CF1318A
                                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CF1319C
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,6CF1B5A2,000000FF,?,6CF130EF,?,?,6CF130C3,?), ref: 6CF131BE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                          • API String ID: 4061214504-1276376045
                                                                                                          • Opcode ID: a7a5a94e7dcfbe4f53d73a9594361999ca96a3b3e851de88f484bab1f479b3a8
                                                                                                          • Instruction ID: a9b70153892ab6d3ec54de5a914582dc61d74ac2860ac54b3f501e2abe78c81c
                                                                                                          • Opcode Fuzzy Hash: a7a5a94e7dcfbe4f53d73a9594361999ca96a3b3e851de88f484bab1f479b3a8
                                                                                                          • Instruction Fuzzy Hash: E1014F71E58525EFDB029B54CC09BAEBBB8FB05724F014525E821A2E90DB759904CA90
                                                                                                          APIs
                                                                                                          • __alloca_probe_16.LIBCMT ref: 6CF17A59
                                                                                                          • __alloca_probe_16.LIBCMT ref: 6CF17B22
                                                                                                          • __freea.LIBCMT ref: 6CF17B89
                                                                                                            • Part of subcall function 6CF143C2: HeapAlloc.KERNEL32(00000000,6CF153CC,?,?,6CF153CC,00000220,?,00000000,?), ref: 6CF143F4
                                                                                                          • __freea.LIBCMT ref: 6CF17B9C
                                                                                                          • __freea.LIBCMT ref: 6CF17BA9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1096550386-0
                                                                                                          • Opcode ID: a2b614c312becd8d082a0d61cea86e90178df126847d1ff698dd2789f6b205f7
                                                                                                          • Instruction ID: 794d24bed5f87ea72843f12f63e8b71a4f7ece5c3f4deb98e43d29217d8afd2a
                                                                                                          • Opcode Fuzzy Hash: a2b614c312becd8d082a0d61cea86e90178df126847d1ff698dd2789f6b205f7
                                                                                                          • Instruction Fuzzy Hash: AE51B3B2609206AFEB01DF65CC80EAB37A9EF84718F25052AFD1CD7E54E731DE548660
                                                                                                          APIs
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6CF11833,00000000,?,00000001,?,?,?,6CF11922,00000001,FlsFree,6CF1D778,FlsFree), ref: 6CF1188F
                                                                                                          • GetLastError.KERNEL32(?,6CF11833,00000000,?,00000001,?,?,?,6CF11922,00000001,FlsFree,6CF1D778,FlsFree,00000000,?,6CF11381), ref: 6CF11899
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6CF118C1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                                          • String ID: api-ms-
                                                                                                          • API String ID: 3177248105-2084034818
                                                                                                          • Opcode ID: c75c4a5914431615c0dcee5c8c8405d3e3823b480d0be30e0e8c0742d9ddf5a9
                                                                                                          • Instruction ID: 887c165a34724277eb3b2dd494aa0be5585684f1be714d01bbb426d45109e6c6
                                                                                                          • Opcode Fuzzy Hash: c75c4a5914431615c0dcee5c8c8405d3e3823b480d0be30e0e8c0742d9ddf5a9
                                                                                                          • Instruction Fuzzy Hash: F0E04830B48204BBEF002A61DC06B883B79AB11798F168030F90DE4C94E762D5149684
                                                                                                          APIs
                                                                                                          • GetConsoleOutputCP.KERNEL32(997DF8DE,00000000,00000000,?), ref: 6CF18144
                                                                                                            • Part of subcall function 6CF15A21: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CF17B7F,?,00000000,-00000008), ref: 6CF15A82
                                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6CF18396
                                                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CF183DC
                                                                                                          • GetLastError.KERNEL32 ref: 6CF1847F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 2112829910-0
                                                                                                          • Opcode ID: 1f18031af044714e03434a7d3eb1aea5200e5a438f969e43b118db33eb29fb61
                                                                                                          • Instruction ID: 26f6e2c84a0a920a0c634878dc17aa0d4ed5000f099be15d6572cce31b71cdf1
                                                                                                          • Opcode Fuzzy Hash: 1f18031af044714e03434a7d3eb1aea5200e5a438f969e43b118db33eb29fb61
                                                                                                          • Instruction Fuzzy Hash: 2BD18A75E082589FCF01CFE9C980AEDBBB5EF09314F29452AE465EBB41D730A942CB50
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AdjustPointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 1740715915-0
                                                                                                          • Opcode ID: fb06bc54d4a1ac049c7d0f5c5bf83c1026ef9b412f6573003c4ca8c679433dd0
                                                                                                          • Instruction ID: 63017a6719f536c23c0a6c5ebce37b26e6db85e3c3b8e0a6045e018e760e570f
                                                                                                          • Opcode Fuzzy Hash: fb06bc54d4a1ac049c7d0f5c5bf83c1026ef9b412f6573003c4ca8c679433dd0
                                                                                                          • Instruction Fuzzy Hash: AE510472A0D2069FEB19CF50D890BAA77B5FF21718F20852DE85547EA0F731EA94C790
                                                                                                          APIs
                                                                                                            • Part of subcall function 6CF15A21: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CF17B7F,?,00000000,-00000008), ref: 6CF15A82
                                                                                                          • GetLastError.KERNEL32 ref: 6CF146D1
                                                                                                          • __dosmaperr.LIBCMT ref: 6CF146D8
                                                                                                          • GetLastError.KERNEL32(?,?,?,?), ref: 6CF14712
                                                                                                          • __dosmaperr.LIBCMT ref: 6CF14719
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 1913693674-0
                                                                                                          • Opcode ID: bba97818ec0a8d7fab2206cae58d1df6d964ac6fad3e109e34779131f47779bb
                                                                                                          • Instruction ID: c54860cff29bb2aac3e6e4e18f2aaabbedef716d70537d035dcfe81e0e4d4d53
                                                                                                          • Opcode Fuzzy Hash: bba97818ec0a8d7fab2206cae58d1df6d964ac6fad3e109e34779131f47779bb
                                                                                                          • Instruction Fuzzy Hash: B721927260C215AFDB109F66D890D5BBFB9FF8536D7058619E818D7E40D731EC118BA0
                                                                                                          APIs
                                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 6CF15ACC
                                                                                                            • Part of subcall function 6CF15A21: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CF17B7F,?,00000000,-00000008), ref: 6CF15A82
                                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CF15B04
                                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CF15B24
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 158306478-0
                                                                                                          • Opcode ID: 6a5e0942b640242ec4f33cb79053285f1d76845ae309c3bf07fa1aebdb71d973
                                                                                                          • Instruction ID: 00db5f13e127befc67afe559314fe19f5437727ae16afda434c00cf804d3413f
                                                                                                          • Opcode Fuzzy Hash: 6a5e0942b640242ec4f33cb79053285f1d76845ae309c3bf07fa1aebdb71d973
                                                                                                          • Instruction Fuzzy Hash: 161104F2F591097F670157B64CCADAF7A6CDE866AC3010424F801D2E00FB24DE0086B0
                                                                                                          APIs
                                                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6CF18FA5,00000000,00000001,00000000,?,?,6CF184D3,?,00000000,00000000), ref: 6CF197FD
                                                                                                          • GetLastError.KERNEL32(?,6CF18FA5,00000000,00000001,00000000,?,?,6CF184D3,?,00000000,00000000,?,?,?,6CF18A76,00000000), ref: 6CF19809
                                                                                                            • Part of subcall function 6CF197CF: CloseHandle.KERNEL32(FFFFFFFE,6CF19819,?,6CF18FA5,00000000,00000001,00000000,?,?,6CF184D3,?,00000000,00000000,?,?), ref: 6CF197DF
                                                                                                          • ___initconout.LIBCMT ref: 6CF19819
                                                                                                            • Part of subcall function 6CF19791: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CF197C0,6CF18F92,?,?,6CF184D3,?,00000000,00000000,?), ref: 6CF197A4
                                                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6CF18FA5,00000000,00000001,00000000,?,?,6CF184D3,?,00000000,00000000,?), ref: 6CF1982E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                          • String ID:
                                                                                                          • API String ID: 2744216297-0
                                                                                                          • Opcode ID: 2aa56bedbaf06113918905a20c9a3bfa2665960d8aab4fb791d164bdf3550d67
                                                                                                          • Instruction ID: b2cac1ddf32520b14093863a6ce52742efb39de69b182f480186e958ca5a1027
                                                                                                          • Opcode Fuzzy Hash: 2aa56bedbaf06113918905a20c9a3bfa2665960d8aab4fb791d164bdf3550d67
                                                                                                          • Instruction Fuzzy Hash: D3F01236914115BBCF522FD5DC09A893F76FF453B5F164014FA1995910CB328920DBD0
                                                                                                          APIs
                                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 6CF10D3F
                                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 6CF10DF3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                                                          • String ID: csm
                                                                                                          • API String ID: 3480331319-1018135373
                                                                                                          • Opcode ID: 9593c19cbd1303451f75c0600410b547afbc79e52e312071497dcc566dff5f0c
                                                                                                          • Instruction ID: 71c426d02115bef242e1b34da40d3f8d12198000901f4b4ac785dd3effe42e39
                                                                                                          • Opcode Fuzzy Hash: 9593c19cbd1303451f75c0600410b547afbc79e52e312071497dcc566dff5f0c
                                                                                                          • Instruction Fuzzy Hash: A841A530A19158EBCF00DF69C840BDEBBB5EF45328F148555E814ABF91DB71E925CB90
                                                                                                          APIs
                                                                                                          • EncodePointer.KERNEL32(00000000,?), ref: 6CF12024
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EncodePointer
                                                                                                          • String ID: MOC$RCC
                                                                                                          • API String ID: 2118026453-2084237596
                                                                                                          • Opcode ID: 13e5cf3ca303c74920790717ede5ea47d792a275e095124dd20c5841a26cc0b5
                                                                                                          • Instruction ID: 916e5fc155bf22c3a4b285d997ffc2b7e6ae20193bd1840d63e3a855ab6c0d26
                                                                                                          • Opcode Fuzzy Hash: 13e5cf3ca303c74920790717ede5ea47d792a275e095124dd20c5841a26cc0b5
                                                                                                          • Instruction Fuzzy Hash: CB415832904209AFCF06CF94CC85AEE7BB5FF09318F258199FA14A7A20D3369950DB51
                                                                                                          APIs
                                                                                                          • std::_Xinvalid_argument.LIBCPMT ref: 6CF0757B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1752645666.000000006CEF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEF0000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.1752605896.000000006CEF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752741763.000000006CF1C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752776300.000000006CF23000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.1752937084.000000006CF7A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_6cef0000_Solara.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Xinvalid_argumentstd::_
                                                                                                          • String ID: string too long
                                                                                                          • API String ID: 909987262-2556327735
                                                                                                          • Opcode ID: 82b72f225355b149630daf95e69558411483a18cb2730fa5781bc89b90aa54d9
                                                                                                          • Instruction ID: 8c5563f52e2265467839a55d40badba17b44301d67154a775ec445c3739b96c0
                                                                                                          • Opcode Fuzzy Hash: 82b72f225355b149630daf95e69558411483a18cb2730fa5781bc89b90aa54d9
                                                                                                          • Instruction Fuzzy Hash: 8931E437B081558FCB04DF7CC5A17EF7BE2AB02B24F100656C8619BB80C6669A09D752

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:2.4%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:60.2%
                                                                                                          Total number of Nodes:98
                                                                                                          Total number of Limit Nodes:6
                                                                                                          execution_graph 19384 411161 CoInitializeSecurity 19456 40cf50 19458 40cf5c 19456->19458 19457 40d41a ExitProcess 19458->19457 19458->19458 19459 40d20f 19458->19459 19462 40d1f6 ShellExecuteW 19458->19462 19460 40d415 19459->19460 19461 40d21c GetCurrentThreadId 19459->19461 19472 442bc0 19460->19472 19464 40d250 GetInputState 19461->19464 19462->19459 19466 40d355 GetCurrentProcessId 19464->19466 19467 40d380 19464->19467 19466->19467 19467->19460 19471 411140 CoInitialize 19467->19471 19475 443f00 19472->19475 19474 442bc5 FreeLibrary 19474->19457 19476 443f09 19475->19476 19476->19474 19477 442ff4 19478 443020 19477->19478 19479 44309e 19478->19479 19484 442cc0 LdrInitializeThunk 19478->19484 19483 442cc0 LdrInitializeThunk 19479->19483 19482 44390d 19483->19482 19484->19479 19385 411183 19416 43c420 19385->19416 19418 43c480 19416->19418 19417 43c4c4 CoCreateInstance 19417->19417 19417->19418 19418->19417 19490 43c516 19491 43c538 SysAllocString 19490->19491 19493 43c5d7 19491->19493 19494 43c5e6 CoSetProxyBlanket 19493->19494 19495 43c98f SysFreeString 19493->19495 19496 43c729 19494->19496 19497 43c780 VariantInit 19494->19497 19498 43c920 19494->19498 19499 43c609 SysAllocString 19494->19499 19500 43c910 VariantClear 19494->19500 19501 43c8f9 VariantClear 19494->19501 19504 43c8e0 19494->19504 19506 43c7d0 19494->19506 19502 43c9a1 19495->19502 19496->19497 19496->19498 19496->19500 19496->19501 19496->19504 19496->19506 19497->19506 19498->19495 19508 43c6b0 19499->19508 19500->19498 19505 43c909 19501->19505 19507 43c9ba GetVolumeInformationW 19502->19507 19505->19500 19506->19498 19506->19500 19506->19501 19506->19504 19509 43cbb1 19507->19509 19511 43caaa 19507->19511 19514 43c9db 19507->19514 19517 43cb6e 19507->19517 19508->19508 19510 43c707 SysAllocString 19508->19510 19513 43fc00 RtlFreeHeap 19509->19513 19510->19496 19512 43fba0 RtlAllocateHeap 19520 43cb12 19512->19520 19519 43cbb7 19513->19519 19514->19509 19514->19511 19514->19512 19514->19517 19517->19509 19524 43fff0 19517->19524 19528 43fe80 19517->19528 19532 440080 19517->19532 19519->19511 19540 442cc0 LdrInitializeThunk 19519->19540 19520->19517 19523 442cc0 LdrInitializeThunk 19520->19523 19523->19517 19525 44004e 19524->19525 19526 43fffa 19524->19526 19525->19517 19526->19525 19541 442cc0 LdrInitializeThunk 19526->19541 19529 43ff32 19528->19529 19530 43fe91 19528->19530 19529->19517 19530->19529 19542 442cc0 LdrInitializeThunk 19530->19542 19533 4400f6 19532->19533 19534 440092 19532->19534 19533->19517 19534->19533 19537 4400ee 19534->19537 19543 442cc0 LdrInitializeThunk 19534->19543 19536 44021e 19536->19533 19536->19536 19545 442cc0 LdrInitializeThunk 19536->19545 19537->19536 19544 442cc0 LdrInitializeThunk 19537->19544 19540->19511 19541->19525 19542->19529 19543->19537 19544->19536 19545->19533 19546 4432f2 19547 443310 19546->19547 19550 442cc0 LdrInitializeThunk 19547->19550 19549 4433c0 19550->19549 19429 442f0d 19431 442f40 19429->19431 19430 442fae 19431->19430 19433 442cc0 LdrInitializeThunk 19431->19433 19433->19430 19551 44317a GetForegroundWindow 19552 443188 19551->19552 19434 40f9ef 19435 40fb47 19434->19435 19438 40fa01 19434->19438 19439 40fb57 19434->19439 19436 442be0 2 API calls 19435->19436 19436->19439 19438->19435 19438->19439 19440 442be0 19438->19440 19441 442c93 19440->19441 19442 442bfb 19440->19442 19446 442c09 19440->19446 19447 442c99 19440->19447 19453 43fba0 19441->19453 19442->19446 19449 43fc00 19442->19449 19444 43fba0 RtlAllocateHeap 19448 442ca2 19444->19448 19446->19435 19447->19444 19450 43fc18 RtlFreeHeap 19449->19450 19451 43fc8c 19449->19451 19450->19451 19451->19446 19454 43fbc0 19453->19454 19454->19454 19455 43fbde RtlAllocateHeap 19454->19455 19455->19447
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ;&1$9624C1592BF0BB8F90C03F9E7B99FFA9$:+*)$B#A$KJML$abv>$c`rX$elyx$ft`.$hi$mjk)$sergei-esenin.com$tp~&$)5*$/=-$SQ$WU$[Y
                                                                                                          • API String ID: 0-1378136920
                                                                                                          • Opcode ID: ea86ca9daff62e6a61934ca8e0e89155f3254d41e330685a7924b14f1897c192
                                                                                                          • Instruction ID: 1ab48516a69e41e5a5d48a26003f25f5f4dfab9b2bb2c9dfc8c5748784172516
                                                                                                          • Opcode Fuzzy Hash: ea86ca9daff62e6a61934ca8e0e89155f3254d41e330685a7924b14f1897c192
                                                                                                          • Instruction Fuzzy Hash: 0A9234B15093908BD3209F25D8917EFBBE1AFD2308F18492DE4C95B392DB794905CB8B

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 247 43c516-43c536 248 43c57b-43c5ae 247->248 249 43c538-43c553 247->249 250 43c560-43c579 248->250 251 43c5b0-43c5df SysAllocString 248->251 249->250 250->248 253 43c5e6-43c602 CoSetProxyBlanket 251->253 254 43c98f-43c9d4 SysFreeString call 4452a0 GetVolumeInformationW 251->254 255 43c741-43c75c 253->255 256 43c780-43c7c9 VariantInit 253->256 257 43c8e0 253->257 258 43c8a0-43c8c9 253->258 259 43c986-43c98b 253->259 260 43c926-43c92b 253->260 261 43c609-43c619 253->261 262 43c8e9-43c8f0 call 40c800 253->262 263 43c8f3 253->263 264 43c8d0-43c8d9 253->264 265 43c910-43c920 VariantClear 253->265 266 43c8f9-43c909 VariantClear 253->266 267 43c738 253->267 268 43c81e-43c830 253->268 291 43ca23 254->291 292 43cac2 254->292 293 43ca00-43ca09 254->293 294 43ca80-43ca8d 254->294 295 43cac0 254->295 296 43ca26-43ca4f call 434640 254->296 297 43cb04-43cb0d call 43fba0 254->297 298 43caaa-43caaf 254->298 299 43cab2-43cabf 254->299 300 43cbb1-43cbcf call 43fc00 254->300 301 43cab0 254->301 302 43ca10-43ca1c 254->302 303 43cc17-43cc29 254->303 304 43ca94-43caa3 254->304 305 43c9db-43c9ed 254->305 306 43cafd-43caff 254->306 279 43c760-43c779 255->279 271 43c7d0-43c7ef 256->271 257->262 258->257 258->260 258->262 258->263 258->264 258->265 258->266 259->254 260->259 269 43c620-43c634 261->269 262->263 264->257 264->258 264->260 264->262 264->263 264->264 264->265 264->266 265->260 266->265 267->255 272 43c832-43c839 268->272 273 43c868-43c896 call 40c7f0 call 432840 268->273 269->269 276 43c636-43c6af SysAllocString 269->276 271->271 281 43c7f1-43c801 271->281 282 43c847-43c84b 272->282 273->257 273->258 273->260 273->262 273->263 273->264 273->265 273->266 288 43c6b0-43c705 276->288 279->256 279->257 279->258 279->260 279->262 279->263 279->264 279->265 279->266 279->268 309 43c805-43c817 281->309 284 43c83b 282->284 285 43c84d-43c856 282->285 310 43c83c-43c845 284->310 289 43c858-43c85b 285->289 290 43c85d-43c861 285->290 288->288 308 43c707-43c725 SysAllocString 288->308 289->310 290->310 311 43c863-43c866 290->311 291->296 293->291 293->292 293->294 293->295 293->296 293->297 293->300 293->302 293->303 293->304 293->306 294->292 294->294 294->295 294->297 294->300 294->303 294->304 294->306 327 43ca50-43ca57 296->327 325 43cb12-43cb2b 297->325 298->301 299->295 332 43cbd0-43cbe2 300->332 302->291 302->292 302->294 302->295 302->296 302->297 302->300 302->303 302->304 302->306 303->300 313 43cc30-43cc48 call 43fff0 303->313 314 43cc4f-43cca5 call 43fe60 call 43fe80 303->314 315 43ccac-43ccc0 call 440080 303->315 304->291 304->292 304->293 304->294 304->295 304->296 304->297 304->298 304->299 304->300 304->301 304->302 304->303 304->304 304->306 305->291 305->292 305->293 305->294 305->295 305->296 305->297 305->298 305->299 305->300 305->301 305->302 305->303 305->304 305->306 317 43cce5-43ccec 306->317 324 43c729-43c731 308->324 309->257 309->258 309->260 309->262 309->263 309->264 309->265 309->266 309->268 310->273 310->282 311->310 313->300 313->314 313->315 314->313 314->315 315->313 324->255 324->256 324->257 324->258 324->260 324->262 324->263 324->264 324->265 324->266 324->267 324->268 331 43cb30-43cb42 325->331 327->327 334 43ca59-43ca74 327->334 331->331 336 43cb44-43cb4f 331->336 332->332 333 43cbe4-43cbec 332->333 337 43cbf2-43cbff 333->337 338 43ccdf-43cce3 333->338 334->292 334->294 334->295 334->297 334->300 334->303 334->304 334->306 340 43cb51-43cb59 336->340 341 43cb97-43cbaa 336->341 342 43cc00-43cc07 337->342 338->317 343 43cb60-43cb67 340->343 341->300 341->303 344 43ccc5-43cccb 342->344 345 43cc0d-43cc10 342->345 346 43cb70-43cb76 343->346 347 43cb69-43cb6c 343->347 344->338 349 43cccd-43ccdc call 442cc0 344->349 345->342 348 43cc12 345->348 346->341 350 43cb78-43cb94 call 442cc0 346->350 347->343 351 43cb6e 347->351 348->338 349->338 350->341 351->341
                                                                                                          APIs
                                                                                                          • SysAllocString.OLEAUT32(?), ref: 0043C5B4
                                                                                                          • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?,00000000), ref: 0043C5F7
                                                                                                          • SysAllocString.OLEAUT32(?), ref: 0043C637
                                                                                                          • SysAllocString.OLEAUT32(00000018), ref: 0043C70B
                                                                                                          • VariantInit.OLEAUT32(?), ref: 0043C781
                                                                                                          • VariantClear.OLEAUT32(00000019), ref: 0043C8FA
                                                                                                          • VariantClear.OLEAUT32(00000019), ref: 0043C911
                                                                                                          • SysFreeString.OLEAUT32(?), ref: 0043C992
                                                                                                          • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043C9CB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: String$AllocVariant$Clear$BlanketFreeInformationInitProxyVolume
                                                                                                          • String ID: K*$Lgfe
                                                                                                          • API String ID: 166343141-1944196812
                                                                                                          • Opcode ID: 92e96b66aff5ce9aaef89e422022859700a6dbda2e10e98f07d9ed25b8de3740
                                                                                                          • Instruction ID: 9bbedc36a9c05e1e6ed74e899277d5afd5f395ce79edc15d664a50c967b996af
                                                                                                          • Opcode Fuzzy Hash: 92e96b66aff5ce9aaef89e422022859700a6dbda2e10e98f07d9ed25b8de3740
                                                                                                          • Instruction Fuzzy Hash: 8F122179604700CFD724CF29D891B6AB7F1FB8A315F14992DE5868B3A2D738E406CB48

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 406 40cf50-40cf5e call 4414b0 409 40cf64-40cf7f 406->409 410 40d41a-40d41c ExitProcess 406->410 411 40cf80-40cfa2 409->411 411->411 412 40cfa4-40cfc2 411->412 413 40cfd0-40cff5 412->413 413->413 414 40cff7-40d01f 413->414 415 40d020-40d052 414->415 415->415 416 40d054-40d07f 415->416 417 40d080-40d0a1 416->417 417->417 418 40d0a3-40d0ef 417->418 419 40d0f0-40d128 418->419 419->419 420 40d12a-40d12f 419->420 421 40d135-40d175 420->421 422 40d20f-40d216 call 439b20 420->422 423 40d180-40d1b8 421->423 428 40d415 call 442bc0 422->428 429 40d21c-40d242 GetCurrentThreadId 422->429 423->423 425 40d1ba-40d1db 423->425 427 40d1e0-40d1f4 425->427 427->427 430 40d1f6-40d209 ShellExecuteW 427->430 428->410 431 40d250-40d28e 429->431 430->422 431->431 433 40d290-40d2a4 431->433 434 40d2b0-40d2d5 433->434 434->434 435 40d2d7-40d2eb 434->435 436 40d2f0-40d349 435->436 436->436 437 40d34b-40d353 GetInputState 436->437 438 40d355-40d37b GetCurrentProcessId 437->438 439 40d3aa-40d3c5 437->439 440 40d380-40d3a8 438->440 441 40d3d0-40d400 439->441 440->439 440->440 441->441 442 40d402-40d409 call 40e430 441->442 442->428 445 40d40b call 411140 442->445 447 40d410 call 40fed0 445->447 447->428
                                                                                                          APIs
                                                                                                          • ShellExecuteW.SHELL32(00000000,B726891B,0044A3DA,?,00000000,00000005), ref: 0040D209
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 0040D21C
                                                                                                          • GetInputState.USER32 ref: 0040D34B
                                                                                                          • GetCurrentProcessId.KERNEL32(?,00000000,00000005), ref: 0040D355
                                                                                                          • ExitProcess.KERNEL32 ref: 0040D41C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentProcess$ExecuteExitInputShellStateThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 288744916-0
                                                                                                          • Opcode ID: 06c3bc9e55a8e77195fefe671e4c61179e53e110d77dd770e7b890816a0fce40
                                                                                                          • Instruction ID: 0fd37e766399452ea79ea1ecf89dbf4f21738cee6a7900bf6f7899c6cc0f7193
                                                                                                          • Opcode Fuzzy Hash: 06c3bc9e55a8e77195fefe671e4c61179e53e110d77dd770e7b890816a0fce40
                                                                                                          • Instruction Fuzzy Hash: 23C17836E483504BD3049F69C88536BFBD3EBD6325F19893DD4C4D7385DAB8884A8786

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 449 40e9b5-40ea8f 450 40ea90-40eac6 449->450 450->450 451 40eac8-40eacb call 40f6a0 450->451 453 40ead0-40eaeb 451->453
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: GA$GA$KC$yE$}{[a${[a
                                                                                                          • API String ID: 0-2277813210
                                                                                                          • Opcode ID: 33dcb3a76e6969f6d6fe45914719672561f7cb1c3dc492d1340dc5c8cf3bb303
                                                                                                          • Instruction ID: ee125bc528aba6d56bb129c4200fab81ce282c5241c1ad6e2daef603022604aa
                                                                                                          • Opcode Fuzzy Hash: 33dcb3a76e6969f6d6fe45914719672561f7cb1c3dc492d1340dc5c8cf3bb303
                                                                                                          • Instruction Fuzzy Hash: 533132B4921244CFC758CF26C69496ABFB1BB66310B2A81D8D101AF376D738C941CF99

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 454 43c420-43c47f 455 43c480-43c49d 454->455 455->455 456 43c49f-43c4b6 455->456 458 43c4c4-43c50b CoCreateInstance 456->458 459 43c4bd 456->459 458->458 458->459 459->458
                                                                                                          APIs
                                                                                                          • CoCreateInstance.OLE32(00449B30,00000000,00000001,00449B20,00000000), ref: 0043C500
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateInstance
                                                                                                          • String ID: dw$e}$r{
                                                                                                          • API String ID: 542301482-3703138658
                                                                                                          • Opcode ID: 71f09e7f722b90aa92155097f3e821371f5e693580c49e44e9ca9d25b534b0d0
                                                                                                          • Instruction ID: 134d8b67cf6fba851e764faf473082ad9ea46f13c3d2b40a5f02dec076a238a6
                                                                                                          • Opcode Fuzzy Hash: 71f09e7f722b90aa92155097f3e821371f5e693580c49e44e9ca9d25b534b0d0
                                                                                                          • Instruction Fuzzy Hash: C121B0B4150B009FE3308F25D949B63BBF4FB46B44F000A1CE1C24BA90D7B9B509CBA6

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 470 4431c3-44320f 471 443210-44325d 470->471 471->471 472 44325f-44326b 471->472 473 443291-44352b call 441250 472->473 474 44326d-443271 472->474 479 443541-4435a6 473->479 480 44352d 473->480 475 443280-44328f 474->475 475->473 475->475 482 4435b0-4435f5 479->482 481 443530-44353f 480->481 481->479 481->481 482->482 483 4435f7-443602 482->483 484 443604-44360f 483->484 485 443645-44365e 483->485 486 443610-443617 484->486 487 443620-443626 486->487 488 443619-44361c 486->488 487->485 490 443628-44363d call 442cc0 487->490 488->486 489 44361e 488->489 489->485 492 443642 490->492 492->485
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: @$[e\c
                                                                                                          • API String ID: 0-444498393
                                                                                                          • Opcode ID: cf95c1a8dc0acaaa058ec7118f14d8a5731c25098cba9fa33136dfa9335819df
                                                                                                          • Instruction ID: c4707bdc3be2f1bf48f5f01bd11900847b3aa0246f70c81749ac7adceba80bd5
                                                                                                          • Opcode Fuzzy Hash: cf95c1a8dc0acaaa058ec7118f14d8a5731c25098cba9fa33136dfa9335819df
                                                                                                          • Instruction Fuzzy Hash: 3E51E1716193428BE710DF65C881327B7E2FFC1746F18492EE1859B351EBB8C6098B5A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 514 442cc0-442cf2 LdrInitializeThunk
                                                                                                          APIs
                                                                                                          • LdrInitializeThunk.NTDLL(00445ECD,005C003F,00000006,?,?,00000018,?,?,?), ref: 00442CEE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID:
                                                                                                          • API String ID: 2994545307-0
                                                                                                          • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                                          • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                                                                                          • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                                          • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID:
                                                                                                          • API String ID: 2994545307-0
                                                                                                          • Opcode ID: 902349fb7c94823cbaed35226d9ac129c474a041ee86e3bb1864b24f72cfc174
                                                                                                          • Instruction ID: 684b29da006afcc7362401d10caeb36d1ac9a5791a635b2df50957aedbbf84e8
                                                                                                          • Opcode Fuzzy Hash: 902349fb7c94823cbaed35226d9ac129c474a041ee86e3bb1864b24f72cfc174
                                                                                                          • Instruction Fuzzy Hash: B8110A30B093015BF3148E58CD5472776E2EFD1326F98952EF4C1973D6DAF888449649

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 501 43fc00-43fc11 502 43fc22-43fc35 501->502 503 43fc20 501->503 504 43fc18-43fc1f 501->504 505 43fc8c-43fc92 501->505 506 43fc40-43fc78 502->506 503->502 504->503 506->506 507 43fc7a-43fc86 RtlFreeHeap 506->507 507->505
                                                                                                          APIs
                                                                                                          • RtlFreeHeap.NTDLL(?,00000000), ref: 0043FC86
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 3298025750-0
                                                                                                          • Opcode ID: 5192fc5040beb1fd904ed67ad98f239ee3a91b63eb10178b7da733c57bcd17cc
                                                                                                          • Instruction ID: 211aead1c6f4c1a4add12b08c5dc655b0fa0cf25a90231986e6a0d288bf32465
                                                                                                          • Opcode Fuzzy Hash: 5192fc5040beb1fd904ed67ad98f239ee3a91b63eb10178b7da733c57bcd17cc
                                                                                                          • Instruction Fuzzy Hash: AC01F2327852109BD7015E1CD896BDBBBE8DBDA326F051838E4C487392C228D81AD796

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 508 43fba0-43fbbb 509 43fbc0-43fbdc 508->509 509->509 510 43fbde-43fbf5 RtlAllocateHeap 509->510
                                                                                                          APIs
                                                                                                          • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 0043FBEA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1279760036-0
                                                                                                          • Opcode ID: 0d8d22724137fb9171bc0a9ac214c8e2644c51d3818145ec9add48bd8f9ac906
                                                                                                          • Instruction ID: a26e58627158a810960647125980d2bc04f80f1c0e575f0ecd98f7289f5fddd5
                                                                                                          • Opcode Fuzzy Hash: 0d8d22724137fb9171bc0a9ac214c8e2644c51d3818145ec9add48bd8f9ac906
                                                                                                          • Instruction Fuzzy Hash: E4F055717483008BC7189F64ED65A2BBB92DFC6714F188A3DE8C18B390C6340C26C39B

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 511 44317a-443183 GetForegroundWindow call 445b20 513 443188-4431ab 511->513
                                                                                                          APIs
                                                                                                          • GetForegroundWindow.USER32 ref: 0044317A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ForegroundWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2020703349-0
                                                                                                          • Opcode ID: 678f4db94619e1c1dd7ea38649d2fe8f8dc404061e84bbb59792b04ab113a243
                                                                                                          • Instruction ID: b8defc69bd823d4044ced74595fe230618df8aff12cc3d2489d32f3e0cf58ab8
                                                                                                          • Opcode Fuzzy Hash: 678f4db94619e1c1dd7ea38649d2fe8f8dc404061e84bbb59792b04ab113a243
                                                                                                          • Instruction Fuzzy Hash: 88D0A73B504150ABD7009B19FDA65A57390D702216B040439F083D2263D6299968CB5B

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 515 411161-411179 CoInitializeSecurity
                                                                                                          APIs
                                                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00411173
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeSecurity
                                                                                                          • String ID:
                                                                                                          • API String ID: 640775948-0
                                                                                                          • Opcode ID: 059d275a806f9d62fff9768a1beefd4dac1c7a2b1f228c0798f03bca34e6de7b
                                                                                                          • Instruction ID: 865ce25ffa8f754c27bf895717889af42b622a4e25707abf040f66898e2eda9c
                                                                                                          • Opcode Fuzzy Hash: 059d275a806f9d62fff9768a1beefd4dac1c7a2b1f228c0798f03bca34e6de7b
                                                                                                          • Instruction Fuzzy Hash: 57D092383C8305F6F2700B58AC17F0431106303F22F300325F360BC1E08AE031508A1E
                                                                                                          APIs
                                                                                                          • CoInitialize.OLE32(00000000), ref: 00411151
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Initialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 2538663250-0
                                                                                                          • Opcode ID: 5a3d1a269e2983305301fe5ced36788ecee0a0609dde5c991efc6f78fa4d167c
                                                                                                          • Instruction ID: a503d282d0a39757e827032928b53d3e56d75d1186f539017d1813aa49ff0952
                                                                                                          • Opcode Fuzzy Hash: 5a3d1a269e2983305301fe5ced36788ecee0a0609dde5c991efc6f78fa4d167c
                                                                                                          • Instruction Fuzzy Hash: 1EC08C34454208BBE210272DAE0AF033A2C9303761F400331B9A0440D1AA602420C5BF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: w!u$$k>i$()$*W,U$*g/e$+c(a$.o8m$;s"q$G7K1$QS$X+V5$X+[)$Y'_!$_#o-$b/`)$cSam$ec$us
                                                                                                          • API String ID: 0-4145598191
                                                                                                          • Opcode ID: fd2a503eeb27c23a339b6796bd6ab6dac7eb8ab26d8934e888d479e704feb7f0
                                                                                                          • Instruction ID: ec649590767d7447abcd29ac8d28183f61c2d1e7eacdcc35cfa09e4b08f04cb8
                                                                                                          • Opcode Fuzzy Hash: fd2a503eeb27c23a339b6796bd6ab6dac7eb8ab26d8934e888d479e704feb7f0
                                                                                                          • Instruction Fuzzy Hash: 1C622FB450D3858BE334CF15D881B9FBBE1BB92704F108A2DE5E99B251DBB480468F93
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: w!u$$k>i$()$*W,U$*g/e$+c(a$.o8m$;s"q$G7K1$QS$X+V5$X+[)$Y'_!$_#o-$b/`)$cSam$ec$us
                                                                                                          • API String ID: 0-4145598191
                                                                                                          • Opcode ID: 0619b4cfa0240b4da6efff57853c527d94ea10218dbbd835c86a345b8b0975fc
                                                                                                          • Instruction ID: a36b9050c165af0e516547c0958bcec90388701dcdb2e7e6912bbd98595ee8c6
                                                                                                          • Opcode Fuzzy Hash: 0619b4cfa0240b4da6efff57853c527d94ea10218dbbd835c86a345b8b0975fc
                                                                                                          • Instruction Fuzzy Hash: 68521DB454D3858BE374CF219881B9FBBE1FB92704F108A2DD5E99B251DBB080468F97
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: "5$'&%$$($+*)$$.sq$4$7654$;=3F$>)kf$HKJM$SRQP$[NC$d$tk$x{zU$zvF4
                                                                                                          • API String ID: 0-4049772501
                                                                                                          • Opcode ID: 803b7932d6ac417fe385105927a6b66042594f7b0cae3775f1d7941c9cbdaacd
                                                                                                          • Instruction ID: 264d658b36381c54fff28a44ab99085b8236c7e4026cc2de60eed8da418b3ee1
                                                                                                          • Opcode Fuzzy Hash: 803b7932d6ac417fe385105927a6b66042594f7b0cae3775f1d7941c9cbdaacd
                                                                                                          • Instruction Fuzzy Hash: B1A2F3716083818FE334CF25D8917ABBBE1AFD6304F58892EE1D98B392D7798405CB56
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                          • String ID: 9$[
                                                                                                          • API String ID: 2832541153-3651825367
                                                                                                          • Opcode ID: 72ae155242bbea7cf0065f4d130a9ffe3b1a06b032e4cc37a3cb74d2e624b145
                                                                                                          • Instruction ID: 23988804b27922a47d596ddb492acdd4ef3492fb0f623715efa0a33efecc4b80
                                                                                                          • Opcode Fuzzy Hash: 72ae155242bbea7cf0065f4d130a9ffe3b1a06b032e4cc37a3cb74d2e624b145
                                                                                                          • Instruction Fuzzy Hash: 1741F57290C3914ED310EF7C858821FBED05B96220F198B3DE8E5972C6D6758909C39B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0_+Q$A+i-$C;D=$E3C5$HK$L#T%$^/i!$r7B)${?R1
                                                                                                          • API String ID: 0-2751585519
                                                                                                          • Opcode ID: 7e5d07f26d5111386fab261639725779ce38784954a16fac21b72aa9b501944d
                                                                                                          • Instruction ID: 3a8eb43d421a5e541724b6472a13629b8974dc3b4cafebab6d171b7ebe809d5c
                                                                                                          • Opcode Fuzzy Hash: 7e5d07f26d5111386fab261639725779ce38784954a16fac21b72aa9b501944d
                                                                                                          • Instruction Fuzzy Hash: 3991BBB4D003288BDB24DF65DC827AEBB70FF06314F54829AD4496B351E7348A86CF96
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0_+Q$A+i-$C;D=$E3C5$HK$L#T%$^/i!$r7B)${?R1
                                                                                                          • API String ID: 0-2751585519
                                                                                                          • Opcode ID: b4ce3d0ff0b136ea552590c10a5e08cdd96db756ec1cdfb4e28af829b04cf1f0
                                                                                                          • Instruction ID: b44420930cfc595a94b4d603bcc6d05f6dac3ddd5ac77c39de16d49cae7ec233
                                                                                                          • Opcode Fuzzy Hash: b4ce3d0ff0b136ea552590c10a5e08cdd96db756ec1cdfb4e28af829b04cf1f0
                                                                                                          • Instruction Fuzzy Hash: 4C91ABB5D003288BDB24DFA5D8867AEBB70FF06314F148299D449AB351E7344A86CF96
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: !A7C$!MNO$KJML$KJML$L9[;$O=N?$vItf$AG
                                                                                                          • API String ID: 0-82243277
                                                                                                          • Opcode ID: 98b50d6869d296e1cf30ba6311fe32dab49c793a9cddcad59e7ebcbb764e85d3
                                                                                                          • Instruction ID: f4e79cf57779696b527ad8831ab85e9393b5edf86aebb1d75cf0b777bd663d3d
                                                                                                          • Opcode Fuzzy Hash: 98b50d6869d296e1cf30ba6311fe32dab49c793a9cddcad59e7ebcbb764e85d3
                                                                                                          • Instruction Fuzzy Hash: B632ED75608351CBE720CF25E88166BBBE1FB96304F54892EE5C587391E738D805CB9B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 6A$KJML$KP$]_$f$n$rA
                                                                                                          • API String ID: 0-3558286288
                                                                                                          • Opcode ID: 07497227aad9b0d30c4f976ebd567037a040053a94f42ff1ea623b30d42d7f07
                                                                                                          • Instruction ID: ceb5684404fc071c0ff1e9991d9d414612f2b6aa5616f415198be639230c1dff
                                                                                                          • Opcode Fuzzy Hash: 07497227aad9b0d30c4f976ebd567037a040053a94f42ff1ea623b30d42d7f07
                                                                                                          • Instruction Fuzzy Hash: 3D8236B5908340CBD720DF15D881BABB7E2FF85314F04892DE99997392E7388945CB9B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: /BfV$Ybl`$Yl5[$]ZSo$p$wrOq
                                                                                                          • API String ID: 0-1944318820
                                                                                                          • Opcode ID: 353af23579b3ce35b2e9ad5c5847b8eee65d91284f734e5bd3e88e0d16b0ee63
                                                                                                          • Instruction ID: 2d7bd3801d536c5826b5fbb93414904ccf25f40a15c7a5ee9af749fb12e5bec3
                                                                                                          • Opcode Fuzzy Hash: 353af23579b3ce35b2e9ad5c5847b8eee65d91284f734e5bd3e88e0d16b0ee63
                                                                                                          • Instruction Fuzzy Hash: EC0246B1A083618FC714CF25E49166BBBE1FF96308F58896EE4C55B342D338E905CB96
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: zE*${)x+
                                                                                                          • API String ID: 0-470808375
                                                                                                          • Opcode ID: 2a4b898a0bded25a0d7bd731136e161f7c857efe40521d592f1e5a0fcfeae8ad
                                                                                                          • Instruction ID: 4dfdc88212276a6e7d2886bfcb55bc526d23f4ee88b632c399f4801d7418444e
                                                                                                          • Opcode Fuzzy Hash: 2a4b898a0bded25a0d7bd731136e161f7c857efe40521d592f1e5a0fcfeae8ad
                                                                                                          • Instruction Fuzzy Hash: 401226716047418FD3258F29C890763BBE2EF9A314F18C65ED4E64B7A2C778E806CB95
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: zE*${)x+
                                                                                                          • API String ID: 0-470808375
                                                                                                          • Opcode ID: 6422f25c51f290c329255681964c32038084f14ff16787bf663d30e85cec32de
                                                                                                          • Instruction ID: 683beb8edce4d48fce2f171467d1da92105bfdf725bb3a484147bc17d9484a2f
                                                                                                          • Opcode Fuzzy Hash: 6422f25c51f290c329255681964c32038084f14ff16787bf663d30e85cec32de
                                                                                                          • Instruction Fuzzy Hash: FF0237702047418FE3258F29C891B63BBE1EF96314F18C56ED0E68B7A2D779D406CB55
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: zE*${)x+
                                                                                                          • API String ID: 0-470808375
                                                                                                          • Opcode ID: 2eec441c722a430d3979b06d5c7e5e6492a03ac5ef8abcf01376e6e80e665ca5
                                                                                                          • Instruction ID: a333fd5c15de003d0da34ded1e8a08ef2b191533e839a348efc40e4df4189c3a
                                                                                                          • Opcode Fuzzy Hash: 2eec441c722a430d3979b06d5c7e5e6492a03ac5ef8abcf01376e6e80e665ca5
                                                                                                          • Instruction Fuzzy Hash: 060235706047418FE3258F29C890B63BBE1EF96314F18C55ED4EA8B7A2C779E406CB55
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: *w$xy
                                                                                                          • API String ID: 0-1364878931
                                                                                                          • Opcode ID: 460ce5924cddd8657541fe55a7b34834bcc2a45b7a79476a92b5a347a507da92
                                                                                                          • Instruction ID: a5bb7b2153112ba927e9dd1cf55a408020d899a35eea8af5c3c596f031079af1
                                                                                                          • Opcode Fuzzy Hash: 460ce5924cddd8657541fe55a7b34834bcc2a45b7a79476a92b5a347a507da92
                                                                                                          • Instruction Fuzzy Hash: 6EF1EDB56093508FD300DF55E88165BBBE0EF82754F50892DE8D59B351E7B88909CB8B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (lPL$(lPL$|w$efg
                                                                                                          • API String ID: 0-2680157272
                                                                                                          • Opcode ID: b3d5e6425ce3f3882059992aa87f09437cc3b40181d0ffa711c08c1842fd7046
                                                                                                          • Instruction ID: fe9033420d0979f2a9fdc82578518aad40a36a13dfc955e7f4e1b44c148f2a08
                                                                                                          • Opcode Fuzzy Hash: b3d5e6425ce3f3882059992aa87f09437cc3b40181d0ffa711c08c1842fd7046
                                                                                                          • Instruction Fuzzy Hash: 842247B2D002258FCB14CFA4C8816AEBBB1FF55310F19826ED855AF356D7789906CB84
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: "OD$"WD$XD
                                                                                                          • API String ID: 0-1088106142
                                                                                                          • Opcode ID: a98998d136bcc4a194447ce1db46a6efbffa8c66ec98d6a4db09ca6fc6d13972
                                                                                                          • Instruction ID: 5af832274502cfa1fd96d347f514d15b18fbd451352208c449ede07d16317c80
                                                                                                          • Opcode Fuzzy Hash: a98998d136bcc4a194447ce1db46a6efbffa8c66ec98d6a4db09ca6fc6d13972
                                                                                                          • Instruction Fuzzy Hash: 4E52EE75A05211CFDB18CF28E8A07AAB7F2FB8A315F1A897ED44597362D734D805CB84
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 84N?$?1>0$KJML
                                                                                                          • API String ID: 0-3517922109
                                                                                                          • Opcode ID: 74f979afedbd4e8a532ba39d7555e23a46da0b6b368afc82043d95401a895028
                                                                                                          • Instruction ID: 327fb9217243c762480ec2521c53d89e3517db4b64c61d3e8518e508b1394e73
                                                                                                          • Opcode Fuzzy Hash: 74f979afedbd4e8a532ba39d7555e23a46da0b6b368afc82043d95401a895028
                                                                                                          • Instruction Fuzzy Hash: 81F1F4716087818FE7298F39C460722FBE1AF57310F1896AEC4DA8B792C779D846CB54
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: KJML$]1wTU_$wTU_
                                                                                                          • API String ID: 0-2536373194
                                                                                                          • Opcode ID: cdaba1089c2a396c092714b99f87c591f818f44904e59b66804296deff946a1a
                                                                                                          • Instruction ID: 93385df08977b2d4fc25bb92ae5eb0afd377cf68a4ce0e485ff28707600d948c
                                                                                                          • Opcode Fuzzy Hash: cdaba1089c2a396c092714b99f87c591f818f44904e59b66804296deff946a1a
                                                                                                          • Instruction Fuzzy Hash: 5BF12275E00255CFDB14CFA9D8907AEBBB2FF4A314F1881A9D4516B3A1C739AD01CB98
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ??;4$FHFA$KJML
                                                                                                          • API String ID: 0-1015406819
                                                                                                          • Opcode ID: 974765d5307f38d9a37e8a830b149da383e6b6941c0311d0ac8549cd3414f762
                                                                                                          • Instruction ID: 19675871241f5ccdce13e8c7c8d171f8bea98ddc876ad241f8c25927d112324b
                                                                                                          • Opcode Fuzzy Hash: 974765d5307f38d9a37e8a830b149da383e6b6941c0311d0ac8549cd3414f762
                                                                                                          • Instruction Fuzzy Hash: C2E158B4E00226CFDB14CF58D8917AEB7B1FF4A304F1441AAD415AB392E778AD41CB99
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID: KJML$cjkf$i!fy
                                                                                                          • API String ID: 2994545307-1317482915
                                                                                                          • Opcode ID: 7bc42e580c91a383bcd02ea3a91d37dfd5b4d4567b50ae69bf2a4c190187bf0e
                                                                                                          • Instruction ID: d8ee5b785f6405f0ad0fa8ab20a5ebf0fccd15df3b054236a1951f4df92bc7e3
                                                                                                          • Opcode Fuzzy Hash: 7bc42e580c91a383bcd02ea3a91d37dfd5b4d4567b50ae69bf2a4c190187bf0e
                                                                                                          • Instruction Fuzzy Hash: AFC15A72B043218BD714DF24E88162BB7A2EFC5704F59852EE8859B395E738DC06C7DA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: "WD$XD
                                                                                                          • API String ID: 0-408183626
                                                                                                          • Opcode ID: 709341e37fffac0385dc8886cba6f6bfba1a8c3e324d28a20b442d3061128633
                                                                                                          • Instruction ID: c8ff928c3e5cdbb719229a74855c4473aeed94adffebadf5af6340452073c376
                                                                                                          • Opcode Fuzzy Hash: 709341e37fffac0385dc8886cba6f6bfba1a8c3e324d28a20b442d3061128633
                                                                                                          • Instruction Fuzzy Hash: 0322EF72A09215CFDB08CF68D8912AEB7F2AF89314F19856ED455E7392DB38D901CB84
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID: KJML$f
                                                                                                          • API String ID: 2994545307-2212088427
                                                                                                          • Opcode ID: a6953bf554a5a5f327900a360bbd01eff89d38fab8d3eed6c1a60ac3c8c8a3df
                                                                                                          • Instruction ID: 0b33802546e2aab595f3a42b6787acbe00ea38ebf504a6ea990ca99cd9bf722d
                                                                                                          • Opcode Fuzzy Hash: a6953bf554a5a5f327900a360bbd01eff89d38fab8d3eed6c1a60ac3c8c8a3df
                                                                                                          • Instruction Fuzzy Hash: 3512C0716083419FE714CF28C890A2BBBE1EFC5314F148A2EF69587392D778E855CB5A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: YZ/-$h
                                                                                                          • API String ID: 0-2460306913
                                                                                                          • Opcode ID: ccd8e6205953157d93298296412cdee330d7bb5d06ea662ebf6f4e37c4eceb2b
                                                                                                          • Instruction ID: 3b8e0abaceefc36510a823e3c29801d1cd02138934cda543847c8a9294aeef2c
                                                                                                          • Opcode Fuzzy Hash: ccd8e6205953157d93298296412cdee330d7bb5d06ea662ebf6f4e37c4eceb2b
                                                                                                          • Instruction Fuzzy Hash: 13F11572608311ABE310DF25D981B6BBBE5EFC5704F08893EF88497391E678D9058B97
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: jfm`$W8m
                                                                                                          • API String ID: 0-2495801694
                                                                                                          • Opcode ID: d2fd6c6dccca46f58157018f07e5f3e0f66b0ef15cb9074ccb691f6337a7565a
                                                                                                          • Instruction ID: 63bd62d5833709707c21caddd0b49579b2796a7a6c8ff8e57996385b85c75fdf
                                                                                                          • Opcode Fuzzy Hash: d2fd6c6dccca46f58157018f07e5f3e0f66b0ef15cb9074ccb691f6337a7565a
                                                                                                          • Instruction Fuzzy Hash: 9FD1F4742047918BD72A8F2AD4A0723BFE1FF5B304F18969ED0D64B792C7399806CB55
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: WT$-+
                                                                                                          • API String ID: 0-882804157
                                                                                                          • Opcode ID: 38fef336118ec33b7226c1cc4cbb7671074636a906bb393d9958f963bfe93745
                                                                                                          • Instruction ID: 8c4bcc8df420f127d5bf968a03d4dbc2a4c0baf9374a6cc51af388f7880e37cf
                                                                                                          • Opcode Fuzzy Hash: 38fef336118ec33b7226c1cc4cbb7671074636a906bb393d9958f963bfe93745
                                                                                                          • Instruction Fuzzy Hash: 66C126B1A00322CBCB24CF14D892673B7B0FF96324B498699D8925F396E378D841CBD4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: WT$-+
                                                                                                          • API String ID: 0-882804157
                                                                                                          • Opcode ID: 32a0392d1787dbbc7b89b2bb0897d90e3a71d04d2a11b510bed33e9188074b88
                                                                                                          • Instruction ID: 356114a6077ac564a7fe6e609bc831d836c8bcad743f9935920156e502615973
                                                                                                          • Opcode Fuzzy Hash: 32a0392d1787dbbc7b89b2bb0897d90e3a71d04d2a11b510bed33e9188074b88
                                                                                                          • Instruction Fuzzy Hash: 30C123B1A017218BCB24CF24C891677BBB1FF56324B99828DC8965F395E339D881CBD4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: KJML$tk
                                                                                                          • API String ID: 0-2859812500
                                                                                                          • Opcode ID: dbc60441945cf9e1967f44465f1ef71324a53f198c09847ad34bb7f8df11b8bb
                                                                                                          • Instruction ID: 29eed480706aaebf2141eb91c1a78785de5ef132ebb3aea559bbc987866c7be6
                                                                                                          • Opcode Fuzzy Hash: dbc60441945cf9e1967f44465f1ef71324a53f198c09847ad34bb7f8df11b8bb
                                                                                                          • Instruction Fuzzy Hash: 83E14075A083228BC724CF24D88056BB3F2FF85750F59892EE8C597350E779AD15CB8A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: Inf$NaN
                                                                                                          • API String ID: 0-3500518849
                                                                                                          • Opcode ID: 862ec2ab933a25227db7fa9215c768e5b681cdcc29266887603bf55694ea6af6
                                                                                                          • Instruction ID: e449c9e2ccc97afd5d9be602a0fb0bcaf08fc3074b12e7987d036dbe93e41533
                                                                                                          • Opcode Fuzzy Hash: 862ec2ab933a25227db7fa9215c768e5b681cdcc29266887603bf55694ea6af6
                                                                                                          • Instruction Fuzzy Hash: F7D1E672A183019BC704CF28C88061FBBE5EBC8710F158A3EF999A73D0E675DD058B86
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ;01"$>2K4
                                                                                                          • API String ID: 0-3132311252
                                                                                                          • Opcode ID: 2b5ef47124ab562b5b31fcbfa6b9766aab39ea6d907b0028eafbee62dd8e1557
                                                                                                          • Instruction ID: cf68b5f938d7d94a2a8a6e2edbdd0c070244593f5d46e8efd776733f4831bf0f
                                                                                                          • Opcode Fuzzy Hash: 2b5ef47124ab562b5b31fcbfa6b9766aab39ea6d907b0028eafbee62dd8e1557
                                                                                                          • Instruction Fuzzy Hash: 2F71DEB41047818FD325CF2AC5A0A22BFA1BF56310B1966DED4D64F766C378E406CB95
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 01[5^3$[5^3
                                                                                                          • API String ID: 0-2583118205
                                                                                                          • Opcode ID: c4e8537019678f3e9ef549c247b9b3275905c767fa5e391bdc1a0742152738ee
                                                                                                          • Instruction ID: f863a96f43ea80462a18e6a4439acd757cf66898281234ce7aaaf70316137065
                                                                                                          • Opcode Fuzzy Hash: c4e8537019678f3e9ef549c247b9b3275905c767fa5e391bdc1a0742152738ee
                                                                                                          • Instruction Fuzzy Hash: 67412436A40711DFCB25CF64C890BABBBE1EF99300F19805DD496AB352C775A842CB98
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: KJML$uxVd
                                                                                                          • API String ID: 0-3416864494
                                                                                                          • Opcode ID: 845918bc59ae1f3f73b88506ff4cf99c7bce6720a099312221a1cbd613bb4ba3
                                                                                                          • Instruction ID: 933fd9a6b269e0b213bb936cc4f722f1f1537e486b7652f8351aeefb2b915f7c
                                                                                                          • Opcode Fuzzy Hash: 845918bc59ae1f3f73b88506ff4cf99c7bce6720a099312221a1cbd613bb4ba3
                                                                                                          • Instruction Fuzzy Hash: A1413631904304ABEB20DF14CE41A6BB7B6EF85300F10882EFA5987352D338DC64DB9A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ?026
                                                                                                          • API String ID: 0-2410484627
                                                                                                          • Opcode ID: 528e1150e7b9ac56716fa2b8a7103c69ca38bc5898752be30f05d7e73f21c4e6
                                                                                                          • Instruction ID: 3ec38c75b13debbe1b51677c28544c8b60241dac7717bc27087e604fe700511c
                                                                                                          • Opcode Fuzzy Hash: 528e1150e7b9ac56716fa2b8a7103c69ca38bc5898752be30f05d7e73f21c4e6
                                                                                                          • Instruction Fuzzy Hash: 75029D742047408FD7258F25C491B62BBE2EF9A314F18D59DC8D68B7A3C739E80ACB65
                                                                                                          APIs
                                                                                                          • CoCreateInstance.OLE32(00449A60,00000000,00000001,00449A50), ref: 004271A9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateInstance
                                                                                                          • String ID:
                                                                                                          • API String ID: 542301482-0
                                                                                                          • Opcode ID: 20868e8003decff1a9ecf477be7ace546b56c8bff2e81e52a765b56acc0f52a7
                                                                                                          • Instruction ID: 03f1ceda27a7c5f158b96155b21c97f43afc36611610cfc71dde0e6564a1cf1f
                                                                                                          • Opcode Fuzzy Hash: 20868e8003decff1a9ecf477be7ace546b56c8bff2e81e52a765b56acc0f52a7
                                                                                                          • Instruction Fuzzy Hash: 3C51BFB17083209BDB20DB64DC82BB733B4EF81368F544559F9858B391E379E801D76A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: KJML
                                                                                                          • API String ID: 0-719402181
                                                                                                          • Opcode ID: e5e581602bc2a55ccfb37693403efe0759c5118dbecf5eed7a7c302b9fb27ebb
                                                                                                          • Instruction ID: 61f755d52da95e828a53ea8c4cecfda00ba2d2134aed331069b02e650f1cae05
                                                                                                          • Opcode Fuzzy Hash: e5e581602bc2a55ccfb37693403efe0759c5118dbecf5eed7a7c302b9fb27ebb
                                                                                                          • Instruction Fuzzy Hash: 33A122B5E00214DBD720AF14CC526B373B1FF96359F08452EE8868B3A1F738A955C75A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: P
                                                                                                          • API String ID: 0-3110715001
                                                                                                          • Opcode ID: ba6f5292d06f699f4070dd606d537ba549fbfacdbe936725bfe82cd68789bd9a
                                                                                                          • Instruction ID: 05e2c835aca4e79af45d04209860e11c8451a35dcc984c576ca4a17cae12bb72
                                                                                                          • Opcode Fuzzy Hash: ba6f5292d06f699f4070dd606d537ba549fbfacdbe936725bfe82cd68789bd9a
                                                                                                          • Instruction Fuzzy Hash: BCD166726083654BE319CE18985032FB6E2EBC5324F16863EE9A69F3C1CB74DC4697C5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: "
                                                                                                          • API String ID: 0-123907689
                                                                                                          • Opcode ID: ec0a4d7e7a130e8e173fe284c57213440baecf839cc35a5dc9babf00f42a6a22
                                                                                                          • Instruction ID: 2b57ba1541f42e8e21a8568950ef5b359da240a3a1337b25709392993a5a653b
                                                                                                          • Opcode Fuzzy Hash: ec0a4d7e7a130e8e173fe284c57213440baecf839cc35a5dc9babf00f42a6a22
                                                                                                          • Instruction Fuzzy Hash: 24C1F6B1B083216BD724CE24E480B6BB7F5AB84714FD9853FE89587381D738DC498796
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: f
                                                                                                          • API String ID: 0-1993550816
                                                                                                          • Opcode ID: 1f8be147d6c71cb6d94941781305ef792ed34139fa22f9e5be8e0f5e09719887
                                                                                                          • Instruction ID: 3fc95c1a35c615a5e5f849bfd1eac13258ab9e3d0ad1e4915d6f7a2649194308
                                                                                                          • Opcode Fuzzy Hash: 1f8be147d6c71cb6d94941781305ef792ed34139fa22f9e5be8e0f5e09719887
                                                                                                          • Instruction Fuzzy Hash: C8B103BA908340CBD7209F25D8417ABB7E2FFC6314F18893DE99487391E7398945CB56
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: "
                                                                                                          • API String ID: 0-123907689
                                                                                                          • Opcode ID: b691a8731d522bf202b6265a6d52436cd82f5d5e5cdb790585c46ddd39a620c4
                                                                                                          • Instruction ID: 658ba1ac174fa5bbb5701e12885ae34a542f5a56f2b0a0088f48170d9bdec3c6
                                                                                                          • Opcode Fuzzy Hash: b691a8731d522bf202b6265a6d52436cd82f5d5e5cdb790585c46ddd39a620c4
                                                                                                          • Instruction Fuzzy Hash: 3681D732B083294BD714CE29E48031FB7F2ABC5710FE9857EE8989B355D3799C49874A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID: KJML
                                                                                                          • API String ID: 2994545307-719402181
                                                                                                          • Opcode ID: 7259ffcdef9f725214efaa646c572f75663b81ec1d8d44d4987743b801546b68
                                                                                                          • Instruction ID: aae6d1a70b394d6a645cc428fa98f49002b7e15d2adbf59507c2af826497a2f4
                                                                                                          • Opcode Fuzzy Hash: 7259ffcdef9f725214efaa646c572f75663b81ec1d8d44d4987743b801546b68
                                                                                                          • Instruction Fuzzy Hash: D7615C32A043119BE7108F6889C066BF7A2FFC6324F19C56FD99867392D3B9DC118789
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID: KJML
                                                                                                          • API String ID: 2994545307-719402181
                                                                                                          • Opcode ID: e244f2a8e87d3e460b21e4f7baed6e80314417ee9993632ba6b3a780dab5fc2f
                                                                                                          • Instruction ID: e760da798e9f8c3b36aecf8f17f001834919442731765f360604eca841833794
                                                                                                          • Opcode Fuzzy Hash: e244f2a8e87d3e460b21e4f7baed6e80314417ee9993632ba6b3a780dab5fc2f
                                                                                                          • Instruction Fuzzy Hash: 0C51E4317083419BF714DF25C980B2BB7E2EB85314F24892EE989877B2D779DC85874A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: KJML
                                                                                                          • API String ID: 0-719402181
                                                                                                          • Opcode ID: 0dc06117b3de228b02055d5659d7e3ce32f1095a4e79d7dd522e666816b8b20f
                                                                                                          • Instruction ID: 496f68cfe23377eab9260d2c270221cd907e1f2a865f71cb2b0a81b68968f923
                                                                                                          • Opcode Fuzzy Hash: 0dc06117b3de228b02055d5659d7e3ce32f1095a4e79d7dd522e666816b8b20f
                                                                                                          • Instruction Fuzzy Hash: 53312771A04310ABE610AA25DCD2B3B77A9EF85708F05553EFD45A7253E239D814839A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: MXB
                                                                                                          • API String ID: 0-1840459873
                                                                                                          • Opcode ID: ee35275d9a34e9cfba15f121bff51c2194f5f762cddf232e5f5a9e99bb76435e
                                                                                                          • Instruction ID: 54d4ca953f57b671d4c7105f66cb0b494950255a10e9672882a2719077d7c472
                                                                                                          • Opcode Fuzzy Hash: ee35275d9a34e9cfba15f121bff51c2194f5f762cddf232e5f5a9e99bb76435e
                                                                                                          • Instruction Fuzzy Hash: 2921F364608711D7D710AF28DC5253BB7F4EF82374F945A49E4D58B391E3788900C7AA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: KJML
                                                                                                          • API String ID: 0-719402181
                                                                                                          • Opcode ID: 4d912743dafe993ba31acc6a73f2028d134ae53fbfd3f0bd51a5844100c7e080
                                                                                                          • Instruction ID: 67847a3a5349aee9a63f75a9970a527da163a1046884678bca3e04b8df67cf2a
                                                                                                          • Opcode Fuzzy Hash: 4d912743dafe993ba31acc6a73f2028d134ae53fbfd3f0bd51a5844100c7e080
                                                                                                          • Instruction Fuzzy Hash: 63212136E00224CFDB148FA9E84076EB372FB4A304F6640BAE54963661C7B56D02CB8D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: KJML
                                                                                                          • API String ID: 0-719402181
                                                                                                          • Opcode ID: be72677f0557254ae2c006caf60763097e6d5860126356f8ce8e951ee76f7ba5
                                                                                                          • Instruction ID: 8c4e0110f88c6525b1dfb98fdfeb133b18489b609f9c7b6e88947239623be4d6
                                                                                                          • Opcode Fuzzy Hash: be72677f0557254ae2c006caf60763097e6d5860126356f8ce8e951ee76f7ba5
                                                                                                          • Instruction Fuzzy Hash: D611E332E00220CBCB08CF94E98067EB372FB4A304F6540AED106737A1D3B59D428B8E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: KJML
                                                                                                          • API String ID: 0-719402181
                                                                                                          • Opcode ID: b444516c049a429139bc7508a90ee86becaec067f7104d34d86f2965549a885f
                                                                                                          • Instruction ID: cd3cacbc8958cf5f107e2a87a6df2beb37950addee7bc6a3de5f91f9843bcd83
                                                                                                          • Opcode Fuzzy Hash: b444516c049a429139bc7508a90ee86becaec067f7104d34d86f2965549a885f
                                                                                                          • Instruction Fuzzy Hash: 5C01B175A042258BCB18CF94E5D02BEB3B2BF9A300F6550AAC08973711C3789D45CF9E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 303c36a8b8a7f96d8aef88ae4b684e67dca33dca7435bdac65628a68eb04069d
                                                                                                          • Instruction ID: cf0df73865c39af8a27db2e383ba25dc87e310e2f9115df183e5622b473bc3ad
                                                                                                          • Opcode Fuzzy Hash: 303c36a8b8a7f96d8aef88ae4b684e67dca33dca7435bdac65628a68eb04069d
                                                                                                          • Instruction Fuzzy Hash: F852C231518315CBC724DF18D8802ABB3E1FFC4314F298A3ED995A7395E739A855CB8A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8b73b5924bfe455a85a47490d23da045897ae78b0f3bc012aedb3378faf647f7
                                                                                                          • Instruction ID: 54a6cfb336f66bf84700c13c4f3c183f23b49e267715de6f9c77ef82aa741379
                                                                                                          • Opcode Fuzzy Hash: 8b73b5924bfe455a85a47490d23da045897ae78b0f3bc012aedb3378faf647f7
                                                                                                          • Instruction Fuzzy Hash: CBE1887A214601CFD718CF29D99076AB7F2FB89319F09853DD88687792D738E941CB84
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID:
                                                                                                          • API String ID: 2994545307-0
                                                                                                          • Opcode ID: cd9ac2066ced0b272329e2da8c41d87b610a7086123142ec58dc8f7c729f1298
                                                                                                          • Instruction ID: 82e67363ac5e6221829c8599006bf9d2501e13bfb50ade001dc1315763ecee39
                                                                                                          • Opcode Fuzzy Hash: cd9ac2066ced0b272329e2da8c41d87b610a7086123142ec58dc8f7c729f1298
                                                                                                          • Instruction Fuzzy Hash: 119114356043128BD715DF18C480A2BB3F2FF8A750F06856EE9859B361EB34EC11CB8A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID:
                                                                                                          • API String ID: 2994545307-0
                                                                                                          • Opcode ID: 248cf560536bd0f856c3d7c225bda352b1c4efebd9f87163617ee6e934d05be3
                                                                                                          • Instruction ID: aae54c732809a90d8ae6e322cd7e61525f89c665e97792c335f496d5b0e9b2b5
                                                                                                          • Opcode Fuzzy Hash: 248cf560536bd0f856c3d7c225bda352b1c4efebd9f87163617ee6e934d05be3
                                                                                                          • Instruction Fuzzy Hash: 8B716935A053019BE725EF18C85063BB3F2FF96750F0A842EE9859B361EB34D854D78A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID:
                                                                                                          • API String ID: 2994545307-0
                                                                                                          • Opcode ID: 69c76fb03af777cea5a82e1470c24e8f0bb7eac79918c91538455b79e513942b
                                                                                                          • Instruction ID: 2ba11ffb798b776aed3031428183eb572784c105051d1a1de1c36ca958a73da8
                                                                                                          • Opcode Fuzzy Hash: 69c76fb03af777cea5a82e1470c24e8f0bb7eac79918c91538455b79e513942b
                                                                                                          • Instruction Fuzzy Hash: 48812431608341ABF720CF29DC41BABB7E5EBC5324F14892EF99583392E7349840CB5A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6e90d7c32807658e95f92c7cfd45234d21f8d32d52fafd78568e10985583fd9d
                                                                                                          • Instruction ID: c84672670c5bb5716a0cc2ab31f7185ad730eb0abbd7f71e805be12aa0488625
                                                                                                          • Opcode Fuzzy Hash: 6e90d7c32807658e95f92c7cfd45234d21f8d32d52fafd78568e10985583fd9d
                                                                                                          • Instruction Fuzzy Hash: DC513A706083009BD7009F29E892B3F77E5FB8A304F10692EF68997292D779D815C75A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 428d7873da69aa17b1f5ce5c61ff9786b56280d46f6bc6ba6fbd3d452c47aa3f
                                                                                                          • Instruction ID: ed980bc96afa24b5e26d18314451e7c1ca0421191e5fa44015e2c9cef196b9a6
                                                                                                          • Opcode Fuzzy Hash: 428d7873da69aa17b1f5ce5c61ff9786b56280d46f6bc6ba6fbd3d452c47aa3f
                                                                                                          • Instruction Fuzzy Hash: 6B51BBB5A046009FC714EF18C880927B7E2FB85324F558A3EE859AB392D735EC51CF96
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4f45860c71b36dbb22a23d4921348e32f409014738fc3881ff55937025abfed4
                                                                                                          • Instruction ID: 12587c1bed67f0492888f70e6cdeac2b6f3692b37b66fd3888174c71f70729d8
                                                                                                          • Opcode Fuzzy Hash: 4f45860c71b36dbb22a23d4921348e32f409014738fc3881ff55937025abfed4
                                                                                                          • Instruction Fuzzy Hash: C231E575609304AFD300EF29AC41B1B77F8EF4A365F40492EF555C3281E779DA048BAA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                          • Instruction ID: 0f39eb27cea14f00c24a8bede1c17dc0b1cd7fab47bffadf86192ea97af8f87a
                                                                                                          • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                          • Instruction Fuzzy Hash: F3112533B081E44EC3129D3C8400566BFA31AA7234F1D939AF4B99B2D6D6668D8A9359
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: d2036d31a6b2ee937928f924f2011fbd93933cf689c02acd9856b6e63cc50f44
                                                                                                          • Instruction ID: dcbec719b0fa3e57d2d6faa4261861f6dc3dd9fe3deff9abcf33c9eef83228c2
                                                                                                          • Opcode Fuzzy Hash: d2036d31a6b2ee937928f924f2011fbd93933cf689c02acd9856b6e63cc50f44
                                                                                                          • Instruction Fuzzy Hash: 080175F670071187D720AF55A4C1B27B2B86F44B08F99453ED90467343DB7EEC0986AD
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f057210bbfdcbbee2b2fe16ab6ae785ce43166e946ee8c9d9838c76897f05522
                                                                                                          • Instruction ID: fc276bcd9e57667d7c172bae2774b4717a19b0d0cc6a7e14e4dac11c02770272
                                                                                                          • Opcode Fuzzy Hash: f057210bbfdcbbee2b2fe16ab6ae785ce43166e946ee8c9d9838c76897f05522
                                                                                                          • Instruction Fuzzy Hash: 76F0E07E7552270BA610DEB59CC043BB7E6D7C5204B09543DD542E3245D575F801D1A9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: cc8815e1caefdcabb1c8feca523002050e4654cc1546fc6923db71fa5b2fcc4d
                                                                                                          • Instruction ID: 3cc83840e48d649ccb35d338e5301b6ba7822ca4830eba629f59ad42d1270e01
                                                                                                          • Opcode Fuzzy Hash: cc8815e1caefdcabb1c8feca523002050e4654cc1546fc6923db71fa5b2fcc4d
                                                                                                          • Instruction Fuzzy Hash: 7AE0CD7AB15611066764CE179801677F3E1EBD6711F8CB52ED441D3244D138C8404265
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e7b117bfbea6400a99ddbf75ff449b5b70eac8b1f266ab9053fcde73136b554d
                                                                                                          • Instruction ID: 0057cf3667f10266d5b6785f04005e9803a65e6ac1b15eee677565dbea5d3bd8
                                                                                                          • Opcode Fuzzy Hash: e7b117bfbea6400a99ddbf75ff449b5b70eac8b1f266ab9053fcde73136b554d
                                                                                                          • Instruction Fuzzy Hash: 5BD0C918A081446796286B39DDAAE3BBABCC747244F006028E847A7291E604D8188AED
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: fb887095e8422a92bf6d1b7e51c50219760e700a459d1eafefdbd9c2ef3436af
                                                                                                          • Instruction ID: 6c623430e68bea02d48ecfd5536ed97dda63d07ce065cf2221a1ad66ca1e7e04
                                                                                                          • Opcode Fuzzy Hash: fb887095e8422a92bf6d1b7e51c50219760e700a459d1eafefdbd9c2ef3436af
                                                                                                          • Instruction Fuzzy Hash: F9C09BB6E0457087DB01BF55684157DB3345F07719F552439E80573243DB18F945469E
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocString
                                                                                                          • String ID: !$"$#$%$'$)$+$-$/$1$3$5$7$9$;$=$?$I$Q$R$T$Y$]$a$a$b$c$c$h$r${
                                                                                                          • API String ID: 2525500382-2513824458
                                                                                                          • Opcode ID: db803e73eb57c6d99aba7a560505e665c17ad81a19c08ea0f41ba71f1f78f7e5
                                                                                                          • Instruction ID: ec1a6813e2cc4ffa1bb43567f46c38aba4ccc173f8c13d6f3834154b4e0b6a17
                                                                                                          • Opcode Fuzzy Hash: db803e73eb57c6d99aba7a560505e665c17ad81a19c08ea0f41ba71f1f78f7e5
                                                                                                          • Instruction Fuzzy Hash: CF91A12150CBC28DD336863C98097DBBED15BA7224F484B9E91F98A2E3C7B54246C767
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MetricsSystem
                                                                                                          • String ID: vC$'nC$,uC$.vC$4}C$A C$FzC$PuC$QoC$UpC$UvC$X}C$Z~C$`wC$f{C$h|C$jzC$lsC$rmC$tuC$xoC$|pC$}C
                                                                                                          • API String ID: 4116985748-174186748
                                                                                                          • Opcode ID: 1de41a796f7c7c2945f359baaf60d5e23e1d7e1d519e82fa3b264251056bc7c6
                                                                                                          • Instruction ID: 0a8f1a278ffd458be4205ed3a482d6bf25b80cb1d2324e41d2521270be2f79d3
                                                                                                          • Opcode Fuzzy Hash: 1de41a796f7c7c2945f359baaf60d5e23e1d7e1d519e82fa3b264251056bc7c6
                                                                                                          • Instruction Fuzzy Hash: 51F126B04593C89BE775DF15C5897DBBAE5BBC6308F648E2E91C84B250C7B8014CDB8A
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInit
                                                                                                          • String ID: F$L$N$d$g$g$m$m$u$z${$}$}
                                                                                                          • API String ID: 2610073882-4216798751
                                                                                                          • Opcode ID: 9b2272d1c2637700aef6298ac09221ce17400ed7ccb67fd97863bc5ac1f88d49
                                                                                                          • Instruction ID: 6d437fe010267870698063eaedda02719b7ac4a53ee0bb3831a6a63f692259f6
                                                                                                          • Opcode Fuzzy Hash: 9b2272d1c2637700aef6298ac09221ce17400ed7ccb67fd97863bc5ac1f88d49
                                                                                                          • Instruction Fuzzy Hash: 9B51293154C3C28AE335DA28C4587EFBED15B92308F098D6DC4DD5B682D7BA0548D763
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInit
                                                                                                          • String ID: .$Q$a$c$e$g$i$k$m$o$r$s
                                                                                                          • API String ID: 2610073882-439072438
                                                                                                          • Opcode ID: 7074daab4ed169e7569e339999eefcd785e9f2a5b70f89b33a64958011d00b3f
                                                                                                          • Instruction ID: a4b1fb7a3ba408c63527201464c1baa79c0f6012301206869f4e40615d8653b3
                                                                                                          • Opcode Fuzzy Hash: 7074daab4ed169e7569e339999eefcd785e9f2a5b70f89b33a64958011d00b3f
                                                                                                          • Instruction Fuzzy Hash: 3641486100D7C18EE3719B7898987DBBFD0ABA6314F084EAED0D89B382C67941488727
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInit
                                                                                                          • String ID: !$#$%$'$)$+$-$/$1$3
                                                                                                          • API String ID: 2610073882-2331977360
                                                                                                          • Opcode ID: 4b2ff6a19490661dd97030cd7318d2a4d61e6c7925bc5b0f44817881ddce85e1
                                                                                                          • Instruction ID: 084519ba09f15f54216546a2bc129c5999e7b13f9af0ad8356666cc8c042fcba
                                                                                                          • Opcode Fuzzy Hash: 4b2ff6a19490661dd97030cd7318d2a4d61e6c7925bc5b0f44817881ddce85e1
                                                                                                          • Instruction Fuzzy Hash: 2541056000C7C19AD3629B38948835BBFE15BA7228F485A9DF1E50B3E2C3768109CB57
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInit
                                                                                                          • String ID: !$#$%$'$)$+$-$/$1$3
                                                                                                          • API String ID: 2610073882-2331977360
                                                                                                          • Opcode ID: 1a20efacf0e195b30e754bf8a711b6bddaf53a2e7060570804146ab8a04217dc
                                                                                                          • Instruction ID: f8a351fd608090bec9361875ee0b16c1ea26082387d95b7d0fc6e22f3608a586
                                                                                                          • Opcode Fuzzy Hash: 1a20efacf0e195b30e754bf8a711b6bddaf53a2e7060570804146ab8a04217dc
                                                                                                          • Instruction Fuzzy Hash: 7541D47000C7C19AD362DB38948835ABFE15BA7228F481A9DF5E54B3E2C3768549CB57
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitVariant
                                                                                                          • String ID: Q$S$U$V$W$i$k$m$o
                                                                                                          • API String ID: 1927566239-286780673
                                                                                                          • Opcode ID: 9cb09c364e5b36dec20ad39ce086e80b3f9db0063f4d46314c7ffdaba325edd6
                                                                                                          • Instruction ID: 50e60367779120f07c3bb968cef5a4fc575c46cc91a9ebde744b89d391a95e3b
                                                                                                          • Opcode Fuzzy Hash: 9cb09c364e5b36dec20ad39ce086e80b3f9db0063f4d46314c7ffdaba325edd6
                                                                                                          • Instruction Fuzzy Hash: 1A418D7290CBD08ED3219B38C48938FBFD1AB96318F194A5EE4E897392C7788544CB53
                                                                                                          APIs
                                                                                                          • SysFreeString.OLEAUT32(?), ref: 0043C95B
                                                                                                          • SysFreeString.OLEAUT32(?), ref: 0043C960
                                                                                                          • SysFreeString.OLEAUT32(?), ref: 0043C979
                                                                                                          • SysFreeString.OLEAUT32(?), ref: 0043C97E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.1860797359.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_400000_aspnet_regiis.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeString
                                                                                                          • String ID:
                                                                                                          • API String ID: 3341692771-0
                                                                                                          • Opcode ID: 7513e40abce2683c0f9875052ac9dd6cda1d204f60d4def54d90547febcd212e
                                                                                                          • Instruction ID: b96013b1363d6de582764c9147e42d707290ad78c484f990cbbe7c665502bef7
                                                                                                          • Opcode Fuzzy Hash: 7513e40abce2683c0f9875052ac9dd6cda1d204f60d4def54d90547febcd212e
                                                                                                          • Instruction Fuzzy Hash: 05D0E935050A44EBCB227B61DE058067BB2FFC57553164838E155134318775F835DF45