Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fpIGwanLZi.exe

Overview

General Information

Sample name:fpIGwanLZi.exe
renamed because original name is a hash value
Original sample name:f22cf9dc92fc4eee3eb35b4cdb613f21fa285d5f7630d2a898e25d4c5c512e5e.exe
Analysis ID:1588644
MD5:b270344e0a2760f0faacbe25670635bc
SHA1:2677ed82fcc97bc63ddba361d4c0052058d263c5
SHA256:f22cf9dc92fc4eee3eb35b4cdb613f21fa285d5f7630d2a898e25d4c5c512e5e
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
AI detected suspicious sample
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • fpIGwanLZi.exe (PID: 7660 cmdline: "C:\Users\user\Desktop\fpIGwanLZi.exe" MD5: B270344E0A2760F0FAACBE25670635BC)
    • fpIGwanLZi.exe (PID: 7816 cmdline: "C:\Users\user\Desktop\fpIGwanLZi.exe" MD5: B270344E0A2760F0FAACBE25670635BC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "recruitment_ck@bprck.co.id", "Password": "@BPR.ck22!!", "Host": "mail.bprck.co.id", "Port": "587", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
    • 0xdc75:$a1: get_encryptedPassword
    • 0xdf50:$a2: get_encryptedUsername
    • 0xda81:$a3: get_timePasswordChanged
    • 0xdb7c:$a4: get_passwordField
    • 0xdc8b:$a5: set_encryptedPassword
    • 0xf26a:$a7: get_logins
    • 0xf1cd:$a10: KeyLoggerEventArgs
    • 0xee5c:$a11: KeyLoggerEventArgsEventHandler
    00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
    • 0x11428:$x1: $%SMTPDV$
    • 0x1148e:$x2: $#TheHashHere%&
    • 0x12ac5:$x3: %FTPDV$
    • 0x12baf:$x4: $%TelegramDv$
    • 0xee5c:$x5: KeyLoggerEventArgs
    • 0xf1cd:$x5: KeyLoggerEventArgs
    • 0x12ae9:$m2: Clipboard Logs ID
    • 0x12cff:$m2: Screenshot Logs ID
    • 0x12e0f:$m2: keystroke Logs ID
    • 0x130e9:$m3: SnakePW
    • 0x12cd7:$m4: \SnakeKeylogger\
    00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x4acad:$a1: get_encryptedPassword
      • 0x616cd:$a1: get_encryptedPassword
      • 0x77eed:$a1: get_encryptedPassword
      • 0x4af88:$a2: get_encryptedUsername
      • 0x619a8:$a2: get_encryptedUsername
      • 0x781c8:$a2: get_encryptedUsername
      • 0x4aab9:$a3: get_timePasswordChanged
      • 0x614d9:$a3: get_timePasswordChanged
      • 0x77cf9:$a3: get_timePasswordChanged
      • 0x4abb4:$a4: get_passwordField
      • 0x615d4:$a4: get_passwordField
      • 0x77df4:$a4: get_passwordField
      • 0x4acc3:$a5: set_encryptedPassword
      • 0x616e3:$a5: set_encryptedPassword
      • 0x77f03:$a5: set_encryptedPassword
      • 0x4c2a2:$a7: get_logins
      • 0x62cc2:$a7: get_logins
      • 0x794e2:$a7: get_logins
      • 0x4c205:$a10: KeyLoggerEventArgs
      • 0x62c25:$a10: KeyLoggerEventArgs
      • 0x79445:$a10: KeyLoggerEventArgs
      Click to see the 8 entries
      SourceRuleDescriptionAuthorStrings
      0.2.fpIGwanLZi.exe.3ae5e38.2.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        0.2.fpIGwanLZi.exe.3ae5e38.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xc075:$a1: get_encryptedPassword
        • 0xc350:$a2: get_encryptedUsername
        • 0xbe81:$a3: get_timePasswordChanged
        • 0xbf7c:$a4: get_passwordField
        • 0xc08b:$a5: set_encryptedPassword
        • 0xd66a:$a7: get_logins
        • 0xd5cd:$a10: KeyLoggerEventArgs
        • 0xd25c:$a11: KeyLoggerEventArgsEventHandler
        0.2.fpIGwanLZi.exe.3ae5e38.2.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
        • 0xcc0b:$s1: UnHook
        • 0xcc12:$s2: SetHook
        • 0xcc1a:$s3: CallNextHook
        • 0xcc27:$s4: _hook
        0.2.fpIGwanLZi.exe.3ae5e38.2.unpackMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0xf828:$x1: $%SMTPDV$
        • 0xf88e:$x2: $#TheHashHere%&
        • 0x10ec5:$x3: %FTPDV$
        • 0x10faf:$x4: $%TelegramDv$
        • 0xd25c:$x5: KeyLoggerEventArgs
        • 0xd5cd:$x5: KeyLoggerEventArgs
        • 0x10ee9:$m2: Clipboard Logs ID
        • 0x110ff:$m2: Screenshot Logs ID
        • 0x1120f:$m2: keystroke Logs ID
        • 0x114e9:$m3: SnakePW
        • 0x110d7:$m4: \SnakeKeylogger\
        3.2.fpIGwanLZi.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 15 entries
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-11T03:36:50.633385+010028033053Unknown Traffic192.168.2.949757104.21.48.1443TCP
          2025-01-11T03:36:52.200851+010028033053Unknown Traffic192.168.2.949769104.21.48.1443TCP
          2025-01-11T03:36:55.059425+010028033053Unknown Traffic192.168.2.949795104.21.48.1443TCP
          2025-01-11T03:36:57.958539+010028033053Unknown Traffic192.168.2.949819104.21.48.1443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-11T03:36:49.084489+010028032742Potentially Bad Traffic192.168.2.949744193.122.6.16880TCP
          2025-01-11T03:36:50.037614+010028032742Potentially Bad Traffic192.168.2.949744193.122.6.16880TCP
          2025-01-11T03:36:51.585532+010028032742Potentially Bad Traffic192.168.2.949763193.122.6.16880TCP
          2025-01-11T03:36:53.068894+010028032742Potentially Bad Traffic192.168.2.949776193.122.6.16880TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "recruitment_ck@bprck.co.id", "Password": "@BPR.ck22!!", "Host": "mail.bprck.co.id", "Port": "587", "Version": "5.1"}
          Source: fpIGwanLZi.exeReversingLabs: Detection: 63%
          Source: fpIGwanLZi.exeVirustotal: Detection: 79%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: fpIGwanLZi.exeJoe Sandbox ML: detected

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: fpIGwanLZi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.9:49750 version: TLS 1.0
          Source: fpIGwanLZi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: hEdIE.pdb source: fpIGwanLZi.exe
          Source: Binary string: hEdIE.pdbSHA256K source: fpIGwanLZi.exe
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
          Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49776 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49763 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49744 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49819 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49769 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49757 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49795 -> 104.21.48.1:443
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.9:49750 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: fpIGwanLZi.exe, 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
          Source: fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C52000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
          Source: fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: fpIGwanLZi.exe, 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
          Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
          Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
          Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
          Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757

          System Summary

          barindex
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 3.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 3.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 3.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7660, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7660, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7816, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7816, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_0290D5840_2_0290D584
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_06C7B7600_2_06C7B760
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_06C7B3280_2_06C7B328
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_06C7CFA00_2_06C7CFA0
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_06C7CB680_2_06C7CB68
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B0B3283_2_02B0B328
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B0C1903_2_02B0C190
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B061083_2_02B06108
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B0C7523_2_02B0C752
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B0C4703_2_02B0C470
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B04AD93_2_02B04AD9
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B0CA323_2_02B0CA32
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B0BBD23_2_02B0BBD2
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B068803_2_02B06880
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B098583_2_02B09858
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B0BEB23_2_02B0BEB2
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B0B4F23_2_02B0B4F2
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B035723_2_02B03572
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_0696C2543_2_0696C254
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_0696F3083_2_0696F308
          Source: fpIGwanLZi.exe, 00000000.00000000.1364389373.00000000007CC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamehEdIE.exe< vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1376889034.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1385537496.0000000003B4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1383192228.0000000002AAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1383192228.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1389781295.0000000006E90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1390816772.0000000007CB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000003.00000002.3844962097.0000000000D37000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exeBinary or memory string: OriginalFilenamehEdIE.exe< vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 3.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 3.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 3.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.fpIGwanLZi.exe.3afc858.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.fpIGwanLZi.exe.3ae5e38.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7660, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7660, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7816, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7816, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: fpIGwanLZi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal88.troj.evad.winEXE@3/1@2/2
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fpIGwanLZi.exe.logJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMutant created: NULL
          Source: fpIGwanLZi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: fpIGwanLZi.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: fpIGwanLZi.exeReversingLabs: Detection: 63%
          Source: fpIGwanLZi.exeVirustotal: Detection: 79%
          Source: unknownProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: fpIGwanLZi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: fpIGwanLZi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: fpIGwanLZi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: hEdIE.pdb source: fpIGwanLZi.exe
          Source: Binary string: hEdIE.pdbSHA256K source: fpIGwanLZi.exe
          Source: fpIGwanLZi.exeStatic PE information: 0x9A1BCFA6 [Wed Dec 6 22:18:14 2051 UTC]
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_02B024B9 push 8BFFFFFFh; retf 3_2_02B024BF
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_06960040 push es; retf 3_2_06960EC0
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_06960EC1 push es; retf 3_2_06961240
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 3_2_06961241 push es; iretd 3_2_06961414
          Source: fpIGwanLZi.exeStatic PE information: section name: .text entropy: 6.958210174643718
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 2900000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 2AA0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 4AA0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 93B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: A3B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: A5E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: B5E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 10D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 2B70000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 4B70000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599890Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599671Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599452Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599343Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599234Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599125Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599015Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598906Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598796Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598686Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598544Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598375Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598249Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598103Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598000Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597890Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597781Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597671Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597562Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597453Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597343Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597234Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597124Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597015Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596906Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596796Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596687Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596578Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596468Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596358Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596249Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596140Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596031Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595921Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595812Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595703Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595593Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595484Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595375Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595265Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595156Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595046Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594937Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594828Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594718Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594609Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594500Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594390Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594281Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeWindow / User API: threadDelayed 1709Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeWindow / User API: threadDelayed 8135Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7680Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep count: 32 > 30Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -29514790517935264s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -599890s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7916Thread sleep count: 1709 > 30Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7916Thread sleep count: 8135 > 30Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -599781s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -599671s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -599562s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -599452s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -599343s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -599234s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -599125s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -599015s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -598906s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -598796s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -598686s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -598544s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -598375s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -598249s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -598103s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -598000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -597890s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -597781s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -597671s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -597562s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -597453s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -597343s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -597234s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -597124s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -597015s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -596906s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -596796s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -596687s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -596578s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -596468s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -596358s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -596249s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -596140s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -596031s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -595921s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -595812s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -595703s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -595593s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -595484s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -595375s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -595265s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -595156s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -595046s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -594937s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -594828s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -594718s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -594609s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -594500s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -594390s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7912Thread sleep time: -594281s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599890Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599671Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599452Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599343Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599234Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599125Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 599015Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598906Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598796Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598686Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598544Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598375Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598249Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598103Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 598000Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597890Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597781Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597671Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597562Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597453Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597343Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597234Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597124Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 597015Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596906Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596796Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596687Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596578Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596468Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596358Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596249Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596140Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 596031Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595921Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595812Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595703Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595593Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595484Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595375Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595265Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595156Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 595046Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594937Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594828Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594718Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594609Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594500Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594390Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 594281Jump to behavior
          Source: fpIGwanLZi.exe, 00000003.00000002.3845374292.0000000000EE6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllN
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory written: C:\Users\user\Desktop\fpIGwanLZi.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Users\user\Desktop\fpIGwanLZi.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Users\user\Desktop\fpIGwanLZi.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3ae5e38.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3afc858.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3afc858.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3ae5e38.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.3846138474.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: fpIGwanLZi.exe PID: 7660, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: fpIGwanLZi.exe PID: 7816, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3ae5e38.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3afc858.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3afc858.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3ae5e38.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.3846138474.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: fpIGwanLZi.exe PID: 7660, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: fpIGwanLZi.exe PID: 7816, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          111
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable Media1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Obfuscated Files or Information
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
          Software Packing
          Cached Domain Credentials12
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Timestomp
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          fpIGwanLZi.exe63%ReversingLabsWin32.Trojan.Jalapeno
          fpIGwanLZi.exe79%VirustotalBrowse
          fpIGwanLZi.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          reallyfreegeoip.org
          104.21.48.1
          truefalse
            high
            checkip.dyndns.com
            193.122.6.168
            truefalse
              high
              checkip.dyndns.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/false
                  high
                  https://reallyfreegeoip.org/xml/8.46.123.189false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgfpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://checkip.dyndns.orgfpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C28000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D04000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.comfpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002B71000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.org/qfpIGwanLZi.exe, 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              https://reallyfreegeoip.org/xml/8.46.123.189$fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgfpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D24000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CCD000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C52000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002D32000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002CF6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/fpIGwanLZi.exe, 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000003.00000002.3846138474.0000000002C3A000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    104.21.48.1
                                    reallyfreegeoip.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    193.122.6.168
                                    checkip.dyndns.comUnited States
                                    31898ORACLE-BMC-31898USfalse
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1588644
                                    Start date and time:2025-01-11 03:35:52 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 7m 20s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:8
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:fpIGwanLZi.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:f22cf9dc92fc4eee3eb35b4cdb613f21fa285d5f7630d2a898e25d4c5c512e5e.exe
                                    Detection:MAL
                                    Classification:mal88.troj.evad.winEXE@3/1@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 103
                                    • Number of non-executed functions: 5
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 13.107.246.45, 2.23.242.162, 20.109.210.53
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    21:36:46API Interceptor10963221x Sleep call for process: fpIGwanLZi.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    104.21.48.1NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                    • www.axis138ae.shop/j2vs/
                                    SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                    • twirpx.org/administrator/index.php
                                    SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                    • www.antipromil.site/7ykh/
                                    193.122.6.168ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    h1HIe1rt4D.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    checkip.dyndns.com4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 132.226.8.169
                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 158.101.44.242
                                    rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.6.168
                                    uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 132.226.8.169
                                    6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.6.168
                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 132.226.247.73
                                    VCU262Y2QB.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    reallyfreegeoip.org4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.80.1
                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.80.1
                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 104.21.16.1
                                    rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.80.1
                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.112.1
                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.16.1
                                    uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.64.1
                                    6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.80.1
                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.32.1
                                    VCU262Y2QB.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.48.1
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ORACLE-BMC-31898USn0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 158.101.44.242
                                    rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.6.168
                                    6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.6.168
                                    VCU262Y2QB.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    h1HIe1rt4D.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    yqfze5TKW7.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 158.101.44.242
                                    4AMVusDMPP.exeGet hashmaliciousGuLoaderBrowse
                                    • 193.122.130.0
                                    CLOUDFLARENETUSAJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                                    • 188.114.97.3
                                    1SxKeB4u0c.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.95.160
                                    SpCuEoekPa.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.64.1
                                    AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                                    • 188.114.96.3
                                    suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
                                    • 188.114.97.3
                                    4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.80.1
                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.80.1
                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 104.21.16.1
                                    AxKxwW9WGa.exeGet hashmaliciousFormBookBrowse
                                    • 172.67.186.192
                                    k9OEsV37GE.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.96.1
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    54328bd36c14bd82ddaa0c04b25ed9ad4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.48.1
                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 104.21.48.1
                                    rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.48.1
                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.48.1
                                    6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.48.1
                                    VCU262Y2QB.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.48.1
                                    No context
                                    Process:C:\Users\user\Desktop\fpIGwanLZi.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.34331486778365
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):6.950802950730529
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:fpIGwanLZi.exe
                                    File size:757'760 bytes
                                    MD5:b270344e0a2760f0faacbe25670635bc
                                    SHA1:2677ed82fcc97bc63ddba361d4c0052058d263c5
                                    SHA256:f22cf9dc92fc4eee3eb35b4cdb613f21fa285d5f7630d2a898e25d4c5c512e5e
                                    SHA512:9cb8c9e211e28b9d989993fce4b93429c24f1db7a57c54a594888489568b4f42dee6c8fbadf189978d117e76bf6a85f710484892ecfb3d55ab6cffdde81cf59d
                                    SSDEEP:12288:npZsS4aTEaFP2BHykEW+7CGpfxNuWro8wFiQ4Cg0:nzsHaTEw7Jl7FpruWro8wF9g
                                    TLSH:A1F4933D29BD222BA175C3A7CBDBF427F138986F3115AD6498D343A94346A4734C326E
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............f.... ........@.. ....................................@................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x4ba566
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x9A1BCFA6 [Wed Dec 6 22:18:14 2051 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xba5110x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x5ac.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xbe0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb8c080x70.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xb856c0xb860082e60ee3e19305397cc2f5935f919b74False0.7003138241525424data6.958210174643718IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xbc0000x5ac0x6001fefeea52d892dd9bb08ebb0534bae89False0.4231770833333333data4.111005504871255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xbe0000xc0x200c09020cb67e1caded6bd0125e1440504False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0xbc0900x31cdata0.4396984924623116
                                    RT_MANIFEST0xbc3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-11T03:36:49.084489+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949744193.122.6.16880TCP
                                    2025-01-11T03:36:50.037614+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949744193.122.6.16880TCP
                                    2025-01-11T03:36:50.633385+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949757104.21.48.1443TCP
                                    2025-01-11T03:36:51.585532+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949763193.122.6.16880TCP
                                    2025-01-11T03:36:52.200851+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949769104.21.48.1443TCP
                                    2025-01-11T03:36:53.068894+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949776193.122.6.16880TCP
                                    2025-01-11T03:36:55.059425+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949795104.21.48.1443TCP
                                    2025-01-11T03:36:57.958539+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949819104.21.48.1443TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 11, 2025 03:36:48.206996918 CET4974480192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:48.213515043 CET8049744193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:48.217147112 CET4974480192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:48.298548937 CET4974480192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:48.304794073 CET8049744193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:48.850562096 CET8049744193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:48.856259108 CET4974480192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:48.861077070 CET8049744193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:49.043322086 CET8049744193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:49.084489107 CET4974480192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:49.095588923 CET49750443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.095624924 CET44349750104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:49.095694065 CET49750443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.103576899 CET49750443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.103601933 CET44349750104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:49.570188999 CET44349750104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:49.570252895 CET49750443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.575741053 CET49750443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.575753927 CET44349750104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:49.576139927 CET44349750104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:49.631371975 CET49750443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.646361113 CET49750443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.687324047 CET44349750104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:49.767065048 CET44349750104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:49.767157078 CET44349750104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:49.767210007 CET49750443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.774025917 CET49750443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.778161049 CET4974480192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:49.782917023 CET8049744193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:49.991183043 CET8049744193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:49.993500948 CET49757443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.993545055 CET44349757104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:49.993628025 CET49757443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.993915081 CET49757443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:49.993925095 CET44349757104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:50.037614107 CET4974480192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:50.476022005 CET44349757104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:50.478518009 CET49757443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:50.478562117 CET44349757104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:50.633400917 CET44349757104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:50.633474112 CET44349757104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:50.634356022 CET49757443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:50.634865046 CET49757443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:50.638310909 CET4974480192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:50.639870882 CET4976380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:50.643259048 CET8049744193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:50.643321037 CET4974480192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:50.644649029 CET8049763193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:50.645138025 CET4976380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:50.645457983 CET4976380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:50.650245905 CET8049763193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:51.535799026 CET8049763193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:51.541989088 CET49769443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:51.542035103 CET44349769104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:51.542102098 CET49769443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:51.545929909 CET49769443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:51.545947075 CET44349769104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:51.585531950 CET4976380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:52.036747932 CET44349769104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:52.038569927 CET49769443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:52.038619995 CET44349769104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:52.200860977 CET44349769104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:52.200918913 CET44349769104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:52.200968981 CET49769443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:52.201466084 CET49769443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:52.204823971 CET4976380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:52.205985069 CET4977680192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:52.210155964 CET8049763193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:52.210210085 CET4976380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:52.210850954 CET8049776193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:52.210912943 CET4977680192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:52.211014032 CET4977680192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:52.215864897 CET8049776193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:53.013863087 CET8049776193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:53.015433073 CET49783443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:53.015490055 CET44349783104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:53.015727043 CET49783443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:53.015991926 CET49783443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:53.016010046 CET44349783104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:53.068893909 CET4977680192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:53.486401081 CET44349783104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:53.488250971 CET49783443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:53.488285065 CET44349783104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:53.645328999 CET44349783104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:53.645490885 CET44349783104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:53.645572901 CET49783443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:53.646137953 CET49783443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:53.659563065 CET4978980192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:53.664382935 CET8049789193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:53.664659023 CET4978980192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:53.664891958 CET4978980192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:53.669709921 CET8049789193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:54.424226999 CET8049789193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:54.427087069 CET49795443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:54.427128077 CET44349795104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:54.427349091 CET49795443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:54.427689075 CET49795443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:54.427697897 CET44349795104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:54.475218058 CET4978980192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:54.902738094 CET44349795104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:54.904328108 CET49795443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:54.904356956 CET44349795104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:55.059431076 CET44349795104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:55.059503078 CET44349795104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:55.059631109 CET49795443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:55.060115099 CET49795443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:55.063702106 CET4978980192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:55.064866066 CET4980180192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:55.068707943 CET8049789193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:55.068783045 CET4978980192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:55.069802046 CET8049801193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:55.069900036 CET4980180192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:55.070142031 CET4980180192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:55.075052977 CET8049801193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:56.044583082 CET8049801193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:56.046067953 CET49807443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:56.046101093 CET44349807104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:56.046268940 CET49807443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:56.046514988 CET49807443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:56.046525002 CET44349807104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:56.084507942 CET4980180192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:56.501763105 CET44349807104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:56.506540060 CET49807443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:56.506561041 CET44349807104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:56.656407118 CET44349807104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:56.656472921 CET44349807104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:56.656585932 CET49807443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:56.657083988 CET49807443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:56.660404921 CET4980180192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:56.661720991 CET4981380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:56.665349007 CET8049801193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:56.665409088 CET4980180192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:56.666562080 CET8049813193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:56.666627884 CET4981380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:56.666769981 CET4981380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:56.671561956 CET8049813193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:57.336054087 CET8049813193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:57.337340117 CET49819443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:57.337404966 CET44349819104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:57.337466002 CET49819443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:57.337786913 CET49819443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:57.337801933 CET44349819104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:57.376981020 CET4981380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:57.818418026 CET44349819104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:57.822834015 CET49819443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:57.822863102 CET44349819104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:57.958568096 CET44349819104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:57.958638906 CET44349819104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:57.958678961 CET49819443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:57.959330082 CET49819443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:57.963098049 CET4981380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:57.964112997 CET4982580192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:57.968604088 CET8049813193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:57.968669891 CET4981380192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:57.968918085 CET8049825193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:57.968991995 CET4982580192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:57.969089985 CET4982580192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:57.973866940 CET8049825193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:58.800096035 CET8049825193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:36:58.801561117 CET49831443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:58.801594973 CET44349831104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:58.801671028 CET49831443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:58.801966906 CET49831443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:58.801975965 CET44349831104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:58.850202084 CET4982580192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:36:59.256124020 CET44349831104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:59.258259058 CET49831443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:59.258327007 CET44349831104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:59.389808893 CET44349831104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:59.389873028 CET44349831104.21.48.1192.168.2.9
                                    Jan 11, 2025 03:36:59.389935970 CET49831443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:36:59.390641928 CET49831443192.168.2.9104.21.48.1
                                    Jan 11, 2025 03:37:58.014384985 CET8049776193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:37:58.014452934 CET4977680192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:38:03.799129009 CET8049825193.122.6.168192.168.2.9
                                    Jan 11, 2025 03:38:03.801393032 CET4982580192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:38:38.805527925 CET4982580192.168.2.9193.122.6.168
                                    Jan 11, 2025 03:38:38.812999010 CET8049825193.122.6.168192.168.2.9
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 11, 2025 03:36:48.177910089 CET5931153192.168.2.91.1.1.1
                                    Jan 11, 2025 03:36:48.186691046 CET53593111.1.1.1192.168.2.9
                                    Jan 11, 2025 03:36:49.087960005 CET6505153192.168.2.91.1.1.1
                                    Jan 11, 2025 03:36:49.094937086 CET53650511.1.1.1192.168.2.9
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 11, 2025 03:36:48.177910089 CET192.168.2.91.1.1.10x8adaStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:49.087960005 CET192.168.2.91.1.1.10x1314Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 11, 2025 03:36:48.186691046 CET1.1.1.1192.168.2.90x8adaNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                    Jan 11, 2025 03:36:48.186691046 CET1.1.1.1192.168.2.90x8adaNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:48.186691046 CET1.1.1.1192.168.2.90x8adaNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:48.186691046 CET1.1.1.1192.168.2.90x8adaNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:48.186691046 CET1.1.1.1192.168.2.90x8adaNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:48.186691046 CET1.1.1.1192.168.2.90x8adaNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:49.094937086 CET1.1.1.1192.168.2.90x1314No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:49.094937086 CET1.1.1.1192.168.2.90x1314No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:49.094937086 CET1.1.1.1192.168.2.90x1314No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:49.094937086 CET1.1.1.1192.168.2.90x1314No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:49.094937086 CET1.1.1.1192.168.2.90x1314No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:49.094937086 CET1.1.1.1192.168.2.90x1314No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:36:49.094937086 CET1.1.1.1192.168.2.90x1314No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                    • reallyfreegeoip.org
                                    • checkip.dyndns.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.949744193.122.6.168807816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 03:36:48.298548937 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 03:36:48.850562096 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:48 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:36:48.856259108 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:36:49.043322086 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:48 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:36:49.778161049 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:36:49.991183043 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:49 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.949763193.122.6.168807816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 03:36:50.645457983 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:36:51.535799026 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:51 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.949776193.122.6.168807816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 03:36:52.211014032 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:36:53.013863087 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:52 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.949789193.122.6.168807816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 03:36:53.664891958 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 03:36:54.424226999 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:54 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.949801193.122.6.168807816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 03:36:55.070142031 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 03:36:56.044583082 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:55 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.949813193.122.6.168807816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 03:36:56.666769981 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 03:36:57.336054087 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:57 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.949825193.122.6.168807816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 03:36:57.969089985 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 03:36:58.800096035 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:58 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.949750104.21.48.14437816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:36:49 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-11 02:36:49 UTC863INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:49 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1877798
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QDcQ2IJf8dVPJFCkhFE9AkUADB8N6AcHzVFmbViZQzMwR4E0LDWJTFMhIwZ%2Bw4T2N%2Bw96iwUifOaLkagV%2F26qR%2BHIqnx4%2F7%2FoU3mStqxYmXgti%2FozAuGsOCivH65ihPKrdRJn3ai"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 9001857a9892c323-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1520&min_rtt=1517&rtt_var=571&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1924851&cwnd=214&unsent_bytes=0&cid=4ee41a640fbc1a97&ts=214&x=0"
                                    2025-01-11 02:36:49 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.949757104.21.48.14437816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:36:50 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:36:50 UTC859INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:50 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1877799
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NzVmeNupji25idfgfLP4jThXxXETmkje0TvLG1P%2BdefDGic7X9QOseDPGtV9lXmn1QuFKcXRxEcG%2B6dm%2FvFywcnMW4XVPgx4UPGFUlHGdKfbr5Agbxn9Lp%2Bg%2FxHiR4XT3ilHDsoG"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900185800de142e9-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1597&min_rtt=1592&rtt_var=607&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1787025&cwnd=240&unsent_bytes=0&cid=516051612cb771e1&ts=162&x=0"
                                    2025-01-11 02:36:50 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.949769104.21.48.14437816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:36:52 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:36:52 UTC859INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:52 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1877801
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R9anSDn7Rb4HA8MqfCzTwsxNOxRWeU4J5vuDmX3Rm1%2BtAb88jiQX5c4GF6IWCJfNBD3OLntw18Zk0%2Bfj8ZiHRQElY2WkmxpwreOV%2FNY73p9DnOVwsp%2FGP%2BrX2TSjoyesr8J7k6th"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90018589ca1142e9-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1561&min_rtt=1547&rtt_var=608&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1760096&cwnd=240&unsent_bytes=0&cid=d0bd9d85ae0293cb&ts=155&x=0"
                                    2025-01-11 02:36:52 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.949783104.21.48.14437816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:36:53 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-11 02:36:53 UTC859INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:53 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1877802
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sEXFebcQvYQFDNG0Rib%2Bwj7Ohiv3Zu%2FfUYu566pu6eALPcUtYpFnSlJ%2F86%2Bihn5u9htvYESCWt1E1bL2iePa9%2BszFztDAAgyIeEXQm7QnYBfkZD8JnpKzyNBkxfaSXcN4B6XLZNZ"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90018592e8fb43be-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1684&min_rtt=1650&rtt_var=643&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1769696&cwnd=226&unsent_bytes=0&cid=237a3bfbc981a9a0&ts=163&x=0"
                                    2025-01-11 02:36:53 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.949795104.21.48.14437816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:36:54 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:36:55 UTC855INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:55 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1877804
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ze6d%2BU4%2BSNbhRgziQKOIzDBX9a2fpU3m4vude2yizSu7liUULnsOSY9iILQdHliavWG2UCfwvFplltUCCqZWPqvctm7drUOOV5UNj231d%2Fq8IN10ZnksKFlwn37z1aMSYF4aWCVF"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 9001859bb90fc461-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1623&min_rtt=1604&rtt_var=640&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1660978&cwnd=228&unsent_bytes=0&cid=f3962f47a4827771&ts=164&x=0"
                                    2025-01-11 02:36:55 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.949807104.21.48.14437816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:36:56 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-11 02:36:56 UTC859INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:56 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1877805
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fRD8mDPnttyI7LzZK5GpQGEo0uNkD2Iaj%2BxN9td6OUglosYVmOQZ1WKT%2FNXYX0DQ7E6qnYYjA%2BGg7nYLs4%2FF1MPdoaP0v%2B37oHXO5nDhLiS8PoRxiGRwqqGTSwC1dIcDYE4pTFnA"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900185a5be3842e9-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1692&min_rtt=1687&rtt_var=643&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1689814&cwnd=240&unsent_bytes=0&cid=7618ebb6445c5e42&ts=157&x=0"
                                    2025-01-11 02:36:56 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.949819104.21.48.14437816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:36:57 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:36:57 UTC857INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:57 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1877807
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zGAh6HKbsn0pd3dXnpo0JYVUv7j%2F9D6ZVf23CXniKJw4O6kFEEDd840Sl1%2FG0laIfGCbGH67vDTC%2BkFGFEWaLowLihE9YHxS%2FMNUkfuyL03Bk6O1C0iZ53HHSQmWd22VjAwVyM5l"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900185add90442e9-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1728&min_rtt=1722&rtt_var=659&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1645070&cwnd=240&unsent_bytes=0&cid=40f37d47e36c81e9&ts=142&x=0"
                                    2025-01-11 02:36:57 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    7192.168.2.949831104.21.48.14437816C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:36:59 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-11 02:36:59 UTC861INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:36:59 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1877808
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mtJ8L4WM9%2BkZ%2FNTaldZd%2BI9SkP%2Fv7Zfq0E%2FVYGF6QL3fT0hSztZfwuqK0f3jsdLKYB5OUOLoLZmUHPdlZIZmgKrOq5buVoQHyaL%2F7HN82N1X03kobvMX7f3lfYAZdMhQG1EXMdYU"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900185b6dfb2c461-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1561&min_rtt=1548&rtt_var=607&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1762220&cwnd=228&unsent_bytes=0&cid=ac88ab57a307e02e&ts=138&x=0"
                                    2025-01-11 02:36:59 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:21:36:46
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Desktop\fpIGwanLZi.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\fpIGwanLZi.exe"
                                    Imagebase:0x710000
                                    File size:757'760 bytes
                                    MD5 hash:B270344E0A2760F0FAACBE25670635BC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1385537496.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:21:36:47
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Desktop\fpIGwanLZi.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\fpIGwanLZi.exe"
                                    Imagebase:0x8d0000
                                    File size:757'760 bytes
                                    MD5 hash:B270344E0A2760F0FAACBE25670635BC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.3844854366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.3846138474.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:10.3%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:67
                                      Total number of Limit Nodes:9
                                      execution_graph 36768 290d810 DuplicateHandle 36769 290d8a6 36768->36769 36800 290ae30 36801 290ae3f 36800->36801 36803 290af19 36800->36803 36804 290af5c 36803->36804 36805 290af39 36803->36805 36804->36801 36805->36804 36806 290b160 GetModuleHandleW 36805->36806 36807 290b18d 36806->36807 36807->36801 36812 8140de0 36813 8140df5 36812->36813 36815 8140eb0 36813->36815 36818 8141398 36813->36818 36823 8141388 36813->36823 36814 8140e85 36819 81413bc 36818->36819 36822 81413c3 36818->36822 36819->36814 36820 81416ff GetCurrentThreadId 36821 8141416 36820->36821 36821->36814 36822->36820 36822->36821 36826 814138b 36823->36826 36824 81416ff GetCurrentThreadId 36825 81413bc 36824->36825 36825->36814 36826->36824 36826->36825 36808 6c7e0a0 36809 6c7e129 CreateProcessA 36808->36809 36811 6c7e2eb 36809->36811 36782 290d5c8 36783 290d60e GetCurrentProcess 36782->36783 36785 290d660 GetCurrentThread 36783->36785 36786 290d659 36783->36786 36787 290d696 36785->36787 36788 290d69d GetCurrentProcess 36785->36788 36786->36785 36787->36788 36789 290d6d3 36788->36789 36790 290d6fb GetCurrentThreadId 36789->36790 36791 290d72c 36790->36791 36827 2904668 36828 290467a 36827->36828 36829 2904686 36828->36829 36831 2904779 36828->36831 36832 290479d 36831->36832 36836 2904888 36832->36836 36840 2904878 36832->36840 36837 29048af 36836->36837 36838 290498c 36837->36838 36844 290449c 36837->36844 36838->36838 36841 29048af 36840->36841 36842 290498c 36841->36842 36843 290449c CreateActCtxA 36841->36843 36842->36842 36843->36842 36845 2905918 CreateActCtxA 36844->36845 36847 29059db 36845->36847 36770 8145d58 36771 8145da6 DrawTextExW 36770->36771 36773 8145dfe 36771->36773 36774 6c7d7c8 36775 6c7d808 ResumeThread 36774->36775 36777 6c7d839 36775->36777 36778 6c7df08 36779 6c7df53 ReadProcessMemory 36778->36779 36781 6c7df97 36779->36781 36792 6c7de18 36793 6c7de60 WriteProcessMemory 36792->36793 36795 6c7deb7 36793->36795 36796 6c7dd58 36797 6c7dd98 VirtualAllocEx 36796->36797 36799 6c7ddd5 36797->36799 36848 6c7d878 36849 6c7d8bd Wow64SetThreadContext 36848->36849 36851 6c7d905 36849->36851

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 0290D646
                                      • GetCurrentThread.KERNEL32 ref: 0290D683
                                      • GetCurrentProcess.KERNEL32 ref: 0290D6C0
                                      • GetCurrentThreadId.KERNEL32 ref: 0290D719
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 3d5c06068e3b3b312f76626d8a7293952e7ab9a28c8ff511f79d9b7b33f1ba18
                                      • Instruction ID: e2efe1eae8fa1e736906a654d2f6ad296b7dfb250dbfac44dae52952f32301e2
                                      • Opcode Fuzzy Hash: 3d5c06068e3b3b312f76626d8a7293952e7ab9a28c8ff511f79d9b7b33f1ba18
                                      • Instruction Fuzzy Hash: EA5158B09017498FEB14DFA9D588BDEBBF2EF48304F24805AE019A73A0D774A945CF65

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 0290D646
                                      • GetCurrentThread.KERNEL32 ref: 0290D683
                                      • GetCurrentProcess.KERNEL32 ref: 0290D6C0
                                      • GetCurrentThreadId.KERNEL32 ref: 0290D719
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: c13bd686d6e3e5a8d1c071f17f54d63683aaa8935d8eb2443177bccad7de1ff6
                                      • Instruction ID: 48fae04a5508eb66b50f02b428af03334bbd92188918c24bfdee27c83e23ff59
                                      • Opcode Fuzzy Hash: c13bd686d6e3e5a8d1c071f17f54d63683aaa8935d8eb2443177bccad7de1ff6
                                      • Instruction Fuzzy Hash: E15147B09017099FEB14DFAAD588B9EBBF1FF48304F248059E019A7390D774A944CF66

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 44 6c7e094-6c7e135 47 6c7e137-6c7e141 44->47 48 6c7e16e-6c7e18e 44->48 47->48 49 6c7e143-6c7e145 47->49 55 6c7e1c7-6c7e1f6 48->55 56 6c7e190-6c7e19a 48->56 50 6c7e147-6c7e151 49->50 51 6c7e168-6c7e16b 49->51 53 6c7e155-6c7e164 50->53 54 6c7e153 50->54 51->48 53->53 57 6c7e166 53->57 54->53 62 6c7e22f-6c7e2e9 CreateProcessA 55->62 63 6c7e1f8-6c7e202 55->63 56->55 58 6c7e19c-6c7e19e 56->58 57->51 60 6c7e1c1-6c7e1c4 58->60 61 6c7e1a0-6c7e1aa 58->61 60->55 64 6c7e1ae-6c7e1bd 61->64 65 6c7e1ac 61->65 76 6c7e2f2-6c7e378 62->76 77 6c7e2eb-6c7e2f1 62->77 63->62 66 6c7e204-6c7e206 63->66 64->64 67 6c7e1bf 64->67 65->64 68 6c7e229-6c7e22c 66->68 69 6c7e208-6c7e212 66->69 67->60 68->62 71 6c7e216-6c7e225 69->71 72 6c7e214 69->72 71->71 73 6c7e227 71->73 72->71 73->68 87 6c7e37a-6c7e37e 76->87 88 6c7e388-6c7e38c 76->88 77->76 87->88 89 6c7e380 87->89 90 6c7e38e-6c7e392 88->90 91 6c7e39c-6c7e3a0 88->91 89->88 90->91 94 6c7e394 90->94 92 6c7e3a2-6c7e3a6 91->92 93 6c7e3b0-6c7e3b4 91->93 92->93 95 6c7e3a8 92->95 96 6c7e3c6-6c7e3cd 93->96 97 6c7e3b6-6c7e3bc 93->97 94->91 95->93 98 6c7e3e4 96->98 99 6c7e3cf-6c7e3de 96->99 97->96 101 6c7e3e5 98->101 99->98 101->101
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06C7E2D6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 031d54aeaf634c0733ccf509119f2155d6b2c4b104c35560bc029d8f422a9510
                                      • Instruction ID: d4423da470397c7ce26e6ce80495c7cdb3b0f7b8657e733e25f5dd33de147a85
                                      • Opcode Fuzzy Hash: 031d54aeaf634c0733ccf509119f2155d6b2c4b104c35560bc029d8f422a9510
                                      • Instruction Fuzzy Hash: 48A15D72D00319DFEB60DF69C8417EEBBB2BF48310F1485A9E809A7250DB759A85CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 102 6c7e0a0-6c7e135 104 6c7e137-6c7e141 102->104 105 6c7e16e-6c7e18e 102->105 104->105 106 6c7e143-6c7e145 104->106 112 6c7e1c7-6c7e1f6 105->112 113 6c7e190-6c7e19a 105->113 107 6c7e147-6c7e151 106->107 108 6c7e168-6c7e16b 106->108 110 6c7e155-6c7e164 107->110 111 6c7e153 107->111 108->105 110->110 114 6c7e166 110->114 111->110 119 6c7e22f-6c7e2e9 CreateProcessA 112->119 120 6c7e1f8-6c7e202 112->120 113->112 115 6c7e19c-6c7e19e 113->115 114->108 117 6c7e1c1-6c7e1c4 115->117 118 6c7e1a0-6c7e1aa 115->118 117->112 121 6c7e1ae-6c7e1bd 118->121 122 6c7e1ac 118->122 133 6c7e2f2-6c7e378 119->133 134 6c7e2eb-6c7e2f1 119->134 120->119 123 6c7e204-6c7e206 120->123 121->121 124 6c7e1bf 121->124 122->121 125 6c7e229-6c7e22c 123->125 126 6c7e208-6c7e212 123->126 124->117 125->119 128 6c7e216-6c7e225 126->128 129 6c7e214 126->129 128->128 130 6c7e227 128->130 129->128 130->125 144 6c7e37a-6c7e37e 133->144 145 6c7e388-6c7e38c 133->145 134->133 144->145 146 6c7e380 144->146 147 6c7e38e-6c7e392 145->147 148 6c7e39c-6c7e3a0 145->148 146->145 147->148 151 6c7e394 147->151 149 6c7e3a2-6c7e3a6 148->149 150 6c7e3b0-6c7e3b4 148->150 149->150 152 6c7e3a8 149->152 153 6c7e3c6-6c7e3cd 150->153 154 6c7e3b6-6c7e3bc 150->154 151->148 152->150 155 6c7e3e4 153->155 156 6c7e3cf-6c7e3de 153->156 154->153 158 6c7e3e5 155->158 156->155 158->158
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06C7E2D6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 7f6ed0db8648fe523dd0a5bd998666815cd2ef4bc2955f9e81a04fdc08fec92e
                                      • Instruction ID: 10d087b88a339ba913113274d889cb46e69f35b8f624abd46af8efd6cc3d4ff7
                                      • Opcode Fuzzy Hash: 7f6ed0db8648fe523dd0a5bd998666815cd2ef4bc2955f9e81a04fdc08fec92e
                                      • Instruction Fuzzy Hash: 35915E72D00719CFEB60DF69C8417EEBBB2BF48310F1485A9E809A7250DB759A85CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 159 8141398-81413ba 160 81413c3-81413cd 159->160 161 81413bc-81413c2 159->161 163 81413d3-81413ec 160->163 164 8141609-8141635 160->164 169 81413f2-8141414 163->169 170 814163c-8141671 163->170 164->170 177 8141425-8141434 169->177 178 8141416-8141424 169->178 188 81416b1-81416e8 170->188 189 8141673-814168d 170->189 182 8141436-8141453 177->182 183 8141459-814147a 177->183 182->183 193 814147c-814148d 183->193 194 81414ca-81414f2 183->194 197 81416ff-8141725 GetCurrentThreadId 188->197 198 81416ea-81416fd 188->198 200 81414bc-81414c0 193->200 201 814148f-81414a7 call 8140f84 193->201 226 81414f5 call 81418d0 194->226 227 81414f5 call 81418c0 194->227 202 8141727-814172d 197->202 203 814172e 197->203 206 8141735-8141742 198->206 200->194 214 81414ac-81414ba 201->214 215 81414a9-81414aa 201->215 202->203 203->206 210 81414f8-814151d 217 8141563 210->217 218 814151f-8141534 210->218 214->200 214->201 215->214 217->164 218->217 221 8141536-8141559 218->221 221->217 225 814155b 221->225 225->217 226->210 227->210
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1390860015.0000000008140000.00000040.00000800.00020000.00000000.sdmp, Offset: 08140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8140000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8a322fb33e241cbfd7c743a971d7a38b4e78df9419cb27ee99c0dfa33855f9fc
                                      • Instruction ID: 165418a540cdd81eb86dd72ac477f697410b83b189e26be0f5fa99eee2bb86d4
                                      • Opcode Fuzzy Hash: 8a322fb33e241cbfd7c743a971d7a38b4e78df9419cb27ee99c0dfa33855f9fc
                                      • Instruction Fuzzy Hash: B091FA35A00218DFDB14DFA4D598AEEB7F2FF89211F244499D405AB390DB35AD82CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 228 290af19-290af37 229 290af63-290af67 228->229 230 290af39-290af46 call 29098a0 228->230 232 290af69-290af73 229->232 233 290af7b-290afbc 229->233 236 290af48 230->236 237 290af5c 230->237 232->233 239 290afc9-290afd7 233->239 240 290afbe-290afc6 233->240 283 290af4e call 290b1b0 236->283 284 290af4e call 290b1c0 236->284 237->229 241 290afd9-290afde 239->241 242 290affb-290affd 239->242 240->239 244 290afe0-290afe7 call 290a270 241->244 245 290afe9 241->245 247 290b000-290b007 242->247 243 290af54-290af56 243->237 246 290b098-290b158 243->246 249 290afeb-290aff9 244->249 245->249 278 290b160-290b18b GetModuleHandleW 246->278 279 290b15a-290b15d 246->279 250 290b014-290b01b 247->250 251 290b009-290b011 247->251 249->247 254 290b028-290b031 call 290a280 250->254 255 290b01d-290b025 250->255 251->250 259 290b033-290b03b 254->259 260 290b03e-290b043 254->260 255->254 259->260 261 290b061-290b06e 260->261 262 290b045-290b04c 260->262 269 290b070-290b08e 261->269 270 290b091-290b097 261->270 262->261 264 290b04e-290b05e call 290a290 call 290a2a0 262->264 264->261 269->270 280 290b194-290b1a8 278->280 281 290b18d-290b193 278->281 279->278 281->280 283->243 284->243
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0290B17E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: ab18db07370c929f096cb6fc6f10b50202f558bba666ace8ecfafeb496df9f50
                                      • Instruction ID: 8cef5e1138205d28f6facfff955fa83e48aea5a9772bd9b560fa97a1cd3d90aa
                                      • Opcode Fuzzy Hash: ab18db07370c929f096cb6fc6f10b50202f558bba666ace8ecfafeb496df9f50
                                      • Instruction Fuzzy Hash: B1813570A00B498FD724CF29D49479ABBF5FF88304F10892ED59AD7A90D775E84ACB90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 285 290590c-290598c 286 290598f-29059d9 CreateActCtxA 285->286 288 29059e2-2905a3c 286->288 289 29059db-29059e1 286->289 296 2905a4b-2905a4f 288->296 297 2905a3e-2905a41 288->297 289->288 298 2905a60-2905a90 296->298 299 2905a51-2905a5d 296->299 297->296 303 2905a42-2905a47 298->303 304 2905a92-2905b14 298->304 299->298 303->296
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 029059C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 29a70e427ad0a79fb27ad6f740cac45ab23231bb9868b27c72d5ea91339fb3f0
                                      • Instruction ID: 2e56ec28d5b48d7c0237bdc3310ce0588c4ab6b0ff03eda99cc183e16086671f
                                      • Opcode Fuzzy Hash: 29a70e427ad0a79fb27ad6f740cac45ab23231bb9868b27c72d5ea91339fb3f0
                                      • Instruction Fuzzy Hash: F341AF70C0171DCFEB24CFAAC88578EBBB6BF49704F60846AD409AB251DB756946CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 307 290449c-29059d9 CreateActCtxA 311 29059e2-2905a3c 307->311 312 29059db-29059e1 307->312 319 2905a4b-2905a4f 311->319 320 2905a3e-2905a41 311->320 312->311 321 2905a60-2905a90 319->321 322 2905a51-2905a5d 319->322 320->319 326 2905a42-2905a47 321->326 327 2905a92-2905b14 321->327 322->321 326->319
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 029059C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 1c1c2545029cc977489ac199914144f1e799e34c5e0cc3498d5c06fb405941bd
                                      • Instruction ID: a5509a2fb81b89819e4539dee9d2b60589fee76011c62b766983edd8214c886e
                                      • Opcode Fuzzy Hash: 1c1c2545029cc977489ac199914144f1e799e34c5e0cc3498d5c06fb405941bd
                                      • Instruction Fuzzy Hash: 0341D270C0071DCFEB24CFAAC88478EBBB6BF49704F60846AD409AB251DB756946CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 330 2905a84-2905a90 331 2905a42-2905a47 330->331 332 2905a92-2905b14 330->332 335 2905a4b-2905a4f 331->335 336 2905a60-2905a61 335->336 337 2905a51-2905a5d 335->337 336->330 337->336
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ecc8c176755e36fc7f9176d936231a4e49817ad2f3b3b913b430262a8f636bd9
                                      • Instruction ID: cf6a1013d56eacc075c8a7849d7870fd193b2c8b04962ae8fed90bf51b5fa25b
                                      • Opcode Fuzzy Hash: ecc8c176755e36fc7f9176d936231a4e49817ad2f3b3b913b430262a8f636bd9
                                      • Instruction Fuzzy Hash: 9631AAB180575DCFEB01CFA4C89479EBBF1BF46308FA4418AD415AB291C779A94ACF11

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 340 8145d50-8145da4 342 8145da6-8145dac 340->342 343 8145daf-8145dbe 340->343 342->343 344 8145dc0 343->344 345 8145dc3-8145dfc DrawTextExW 343->345 344->345 346 8145e05-8145e22 345->346 347 8145dfe-8145e04 345->347 347->346
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 08145DEF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1390860015.0000000008140000.00000040.00000800.00020000.00000000.sdmp, Offset: 08140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8140000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: d0f5a0409c1e7dce5365d8ee8623ccfa0b6f03e5a92411514b7d10087c15234b
                                      • Instruction ID: 8bb7fae17a5c5a820104f59c603f623a6de89fff610ce59d076167aafaef217c
                                      • Opcode Fuzzy Hash: d0f5a0409c1e7dce5365d8ee8623ccfa0b6f03e5a92411514b7d10087c15234b
                                      • Instruction Fuzzy Hash: AE31C0B5D012099FDB10CF9AD884ADEFBF9EF48320F14842EE819A7210D775A945CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 350 6c7de10-6c7de66 353 6c7de76-6c7deb5 WriteProcessMemory 350->353 354 6c7de68-6c7de74 350->354 356 6c7deb7-6c7debd 353->356 357 6c7debe-6c7deee 353->357 354->353 356->357
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06C7DEA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 7f1b38a4931e5fe0c92c9d1c77f2e55b2b4fcec4be50c7349d8872dbe1ce308a
                                      • Instruction ID: f91e24c595875ace99eec225a6dc8256ac1e568865b0a6e74ecfea88cf58e909
                                      • Opcode Fuzzy Hash: 7f1b38a4931e5fe0c92c9d1c77f2e55b2b4fcec4be50c7349d8872dbe1ce308a
                                      • Instruction Fuzzy Hash: 252106B59003099FDB10CFA9C885BEEBBF5FF48310F148429E919A7250D779AA55CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 361 6c7de18-6c7de66 363 6c7de76-6c7deb5 WriteProcessMemory 361->363 364 6c7de68-6c7de74 361->364 366 6c7deb7-6c7debd 363->366 367 6c7debe-6c7deee 363->367 364->363 366->367
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06C7DEA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: b1166deb08a4c3cce20c96fe8d314ffa1033fcde16ef3221cfa7e836972753c5
                                      • Instruction ID: 1eb42803350bef983d67d434772f8b23ac4e7ed52a3391fcd31c946be361fb98
                                      • Opcode Fuzzy Hash: b1166deb08a4c3cce20c96fe8d314ffa1033fcde16ef3221cfa7e836972753c5
                                      • Instruction Fuzzy Hash: 852115B19003099FDB10CFA9C885BEEBBF5FF48310F14842AE919A7240D779A944CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 371 8145d58-8145da4 372 8145da6-8145dac 371->372 373 8145daf-8145dbe 371->373 372->373 374 8145dc0 373->374 375 8145dc3-8145dfc DrawTextExW 373->375 374->375 376 8145e05-8145e22 375->376 377 8145dfe-8145e04 375->377 377->376
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 08145DEF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1390860015.0000000008140000.00000040.00000800.00020000.00000000.sdmp, Offset: 08140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8140000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: bcd2824d37b095b3f941530405cff8f7059ce7ffdc50c35498a3f3ab4e5c7fec
                                      • Instruction ID: ef3b589930b1972e4dfe6072fa7e76b5cb20459aafcd8ea60a3141d232f5e57b
                                      • Opcode Fuzzy Hash: bcd2824d37b095b3f941530405cff8f7059ce7ffdc50c35498a3f3ab4e5c7fec
                                      • Instruction Fuzzy Hash: 7C21ACB5D0024A9FDB10CF9AD884ADEFBF5AF48320F14842EE919A7210D775A945CFA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 380 6c7d871-6c7d8c3 383 6c7d8c5-6c7d8d1 380->383 384 6c7d8d3-6c7d8d6 380->384 383->384 385 6c7d8dd-6c7d903 Wow64SetThreadContext 384->385 386 6c7d905-6c7d90b 385->386 387 6c7d90c-6c7d93c 385->387 386->387
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C7D8F6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: e8fe14c752c08b281d801ba32d5f216c0003e7ebfea95828feeade3ee6966a5f
                                      • Instruction ID: c4de11e9ce0d24703fcd13179b67f59fcf6ab9ecc2f82c2dc55b8dfaea2a308e
                                      • Opcode Fuzzy Hash: e8fe14c752c08b281d801ba32d5f216c0003e7ebfea95828feeade3ee6966a5f
                                      • Instruction Fuzzy Hash: 65213871D003099FDB10DFAAC8857EEBBF4EF48210F14842AD459B7240CB78AA44CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 391 6c7df00-6c7df95 ReadProcessMemory 394 6c7df97-6c7df9d 391->394 395 6c7df9e-6c7dfce 391->395 394->395
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06C7DF88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: d94525190848114ea96e33103c530a2bcfbf7511cb339741a832d5cea053fc32
                                      • Instruction ID: c4593b4fe47297deae3f57e86eb6ca5d2e56d4d72be73273b70db4837d978ade
                                      • Opcode Fuzzy Hash: d94525190848114ea96e33103c530a2bcfbf7511cb339741a832d5cea053fc32
                                      • Instruction Fuzzy Hash: 0F2148B2D003499FDB10DFAAC880BEEBBF5FF48310F50842AE519A7240C7799941CBA0
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0290D897
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 959c57e919cb3b2202e3dc26c3da5d4d554cea6a021844e6b6df0dbeb203bf6f
                                      • Instruction ID: f25590f7223f8bd2ea1213b7fc284a1e2506ed689b4fa1dedf51f2b4c807a57e
                                      • Opcode Fuzzy Hash: 959c57e919cb3b2202e3dc26c3da5d4d554cea6a021844e6b6df0dbeb203bf6f
                                      • Instruction Fuzzy Hash: 632112B5D00249DFDB10CFAAD585ADEBBF4FB08310F14842AE958A3350D378A945CFA4
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06C7DF88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 8d16cf464211b242ecb2f8fb3537474872314ec84dfdf84b1d71898ee913b9e8
                                      • Instruction ID: 72388c2e4579e9186f684e7b1a3ff8367584fda78168b4b2cbb86e0fd6993a23
                                      • Opcode Fuzzy Hash: 8d16cf464211b242ecb2f8fb3537474872314ec84dfdf84b1d71898ee913b9e8
                                      • Instruction Fuzzy Hash: D32125B1C003499FDB10CFAAC884BEEBBF5FF48310F14842AE519A7240C779A940CBA1
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C7D8F6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 414cb461b79c5a2b84b3451e2a1b8a2cabb6fc09228161ddf6fabb6649670dc9
                                      • Instruction ID: 6804eb7ffa0e257037174ae87f81ee2432e084d24cdfc19e640dcc80bc68f826
                                      • Opcode Fuzzy Hash: 414cb461b79c5a2b84b3451e2a1b8a2cabb6fc09228161ddf6fabb6649670dc9
                                      • Instruction Fuzzy Hash: 642115B1D003098FDB10DFAAC4857EEBBF5EF48210F54842AD559A7240DB78AA44CFA5
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0290D897
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 3a612c157e295b1e1201a01455ad74f7e399e1fd5c81dda3d526a046a4a51e26
                                      • Instruction ID: fb4e70d976491d5f045fed808a86139784f36e1bff096ab1a9ed9fba613d2f1a
                                      • Opcode Fuzzy Hash: 3a612c157e295b1e1201a01455ad74f7e399e1fd5c81dda3d526a046a4a51e26
                                      • Instruction Fuzzy Hash: 5221E4B5D00209DFDB10CF9AD584ADEFBF9EB48310F14841AE918A3350D374A940CFA4
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06C7DDC6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 5a45b8f02498b227a4eea8198bfd40a44f9cd21c5ea4eb646464935358fd1f79
                                      • Instruction ID: 3208cac8460ae981f56c7a6b6b6ea93b9442d1ebfc4d3fb344fcaab0e5bfc64c
                                      • Opcode Fuzzy Hash: 5a45b8f02498b227a4eea8198bfd40a44f9cd21c5ea4eb646464935358fd1f79
                                      • Instruction Fuzzy Hash: B01147769002099FDB10DFAAD845BEFBBF5EF48310F148419E519A7250CB76A540CFA1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 5455cfd4f13458c9090abced2e26ddf27bd06caa64d6232f1fb177cb93622524
                                      • Instruction ID: dc62da9750b57557525373f0548248c19ae781abcd885ec4e4efc3573ccbbaac
                                      • Opcode Fuzzy Hash: 5455cfd4f13458c9090abced2e26ddf27bd06caa64d6232f1fb177cb93622524
                                      • Instruction Fuzzy Hash: 8B1128B1D003498BDB10DFAAD8457EFFBF5EF88220F14842AD519A7240C779A544CBE5
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06C7DDC6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 5f4861c631c13a525747136391088330a83ee58d349047ba82173e81262f0a0e
                                      • Instruction ID: caac6ae6f5ac910bd9a688922e17afd9eec01bab7b34a10972bf61fa8aae15b4
                                      • Opcode Fuzzy Hash: 5f4861c631c13a525747136391088330a83ee58d349047ba82173e81262f0a0e
                                      • Instruction Fuzzy Hash: 4F1134729003499FDB10DFAAD845BEFBBF5EF48320F14881AE519A7250C779A940CFA4
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: cd3a409ba1b55eaf88dbc0e4e400901366d305184f45d314310546d3b5637231
                                      • Instruction ID: bf92192af15f7e4e2cd3f00647dfa477c977984815829ef3d960a7eead82a91b
                                      • Opcode Fuzzy Hash: cd3a409ba1b55eaf88dbc0e4e400901366d305184f45d314310546d3b5637231
                                      • Instruction Fuzzy Hash: 251125B1D003498BDB10DFAAC4457EEFBF5EF88220F24842AD519A7240C779A944CBA4
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0290B17E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 3ea57fe15506e16b903c356b951e3f2642ba3443048b6a75e12f12f48cdbd6f8
                                      • Instruction ID: 8f401036447892fc82c13f99f898fe4e63f0c9af894a4bd8bd398025cbfcbe7a
                                      • Opcode Fuzzy Hash: 3ea57fe15506e16b903c356b951e3f2642ba3443048b6a75e12f12f48cdbd6f8
                                      • Instruction Fuzzy Hash: 7B1110B6C007498FDB10CF9AC884BDEFBF8EB88314F10842AD418A7250C379A545CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1379432619.00000000010BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_10bd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b659ef651bb68c4efe801890e0f3d2f712df6d8192e1efd15ae13ebe08d16013
                                      • Instruction ID: f6bc30d24d7450eba93ff8c124dcb34c72967fbdc77b4c577b0d0f4969965ba6
                                      • Opcode Fuzzy Hash: b659ef651bb68c4efe801890e0f3d2f712df6d8192e1efd15ae13ebe08d16013
                                      • Instruction Fuzzy Hash: C3214871500304DFDB05DF44C9C0B9AFBA5FB84318F24C5A9E9490B247C73AE446CBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1379587642.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_10cd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 76d755c04327922c7abf71268ddce4c878b96d1f7c24dd571f9945bdd41754da
                                      • Instruction ID: d02b3ffd070f691770f60265f9d65d2efeb0e37d8493071e3ebc387f10a5d879
                                      • Opcode Fuzzy Hash: 76d755c04327922c7abf71268ddce4c878b96d1f7c24dd571f9945bdd41754da
                                      • Instruction Fuzzy Hash: 4E21F1715043409FDB15DF98D4C0B1ABBA5EB84614F34C5ADE88A4B282C336D407CBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1379587642.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_10cd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6d9c3ba83adfe338b167a6105a82a270b4f4440a2cdd4f91973e42dcb438ea15
                                      • Instruction ID: 756695f928c9e75b67315ca4d45dccf681e75f2be013d2c19772ec958ab8cc29
                                      • Opcode Fuzzy Hash: 6d9c3ba83adfe338b167a6105a82a270b4f4440a2cdd4f91973e42dcb438ea15
                                      • Instruction Fuzzy Hash: E621D071504244AFDB05DF94D9C0B2ABBA6FB94724F24C5BDE8894B292C336D846CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1379587642.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_10cd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 248f250b62ef27040153bd83a6528f102dd31b338fa3d0fa316bc2d78235aa1d
                                      • Instruction ID: 7a39f87cbfe52ee0436c9853c2dccecab24acfabe150765bc40c50911c2d180d
                                      • Opcode Fuzzy Hash: 248f250b62ef27040153bd83a6528f102dd31b338fa3d0fa316bc2d78235aa1d
                                      • Instruction Fuzzy Hash: 892198755083809FCB03CF54D594715BFB1EB46314F24C5EAD8854F297C33A9846CBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1379432619.00000000010BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_10bd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                      • Instruction ID: 8a675f528f757af8fca9710966105c2185729e3354d3e18da6025a0dc93c15dc
                                      • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                      • Instruction Fuzzy Hash: 0911CD72404240CFCB02CF44D5C0B96BFA1FB84328F2486A9D8490A656C33AE45ACBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1379587642.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_10cd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                      • Instruction ID: ff4b65981c409422ecd3ce479796cd442cca775da7a5e2bc37a9480ba0b67be2
                                      • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                      • Instruction Fuzzy Hash: C311BE75504240DFCB02CF54C5C0B19BBA2FB84624F24C6AED8494B696C33AD44ACF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9fed2d089846613ba80eb4bb7b8152743720386fe760eaf28a4796b1d3ae0c2a
                                      • Instruction ID: b19971fbab197b3e2c1cea0c307c6dee6cfa0f0bb03c1aec25716bd2fa8c0ae3
                                      • Opcode Fuzzy Hash: 9fed2d089846613ba80eb4bb7b8152743720386fe760eaf28a4796b1d3ae0c2a
                                      • Instruction Fuzzy Hash: 38E1F874E0025A8FDB54DFA9C580AAEFBB2FF89305F248169D414AB359D731AD42CF60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a2447cbb701f2cbac8c20a863bbb7080fc7f037d8cb595378fe9b1bd15f26f11
                                      • Instruction ID: 149ff3bc9fdecd3bdfbdd11dc42920ae55f86088ffa76125d31cc8925a284fdb
                                      • Opcode Fuzzy Hash: a2447cbb701f2cbac8c20a863bbb7080fc7f037d8cb595378fe9b1bd15f26f11
                                      • Instruction Fuzzy Hash: DDE1F774E0025A8FDB54DFA9C580AAEFBB2FF89305F248169D414AB355D731AD42CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6b368d827e02732429f4bb24cf5513c25a7ea21f7833e0c9e877aad716b07878
                                      • Instruction ID: 27649b869a5b30338a9d44b632f40c8be94667a2baa1176bef1268295fd0250e
                                      • Opcode Fuzzy Hash: 6b368d827e02732429f4bb24cf5513c25a7ea21f7833e0c9e877aad716b07878
                                      • Instruction Fuzzy Hash: 8AE12674E0025A8FDB14DFA9C580AAEFBB2FF89301F248169D415AB355D731AD42CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1389637587.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6c70000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 293767f9a57fe0a3ddfedb5a9c8aad8e73de11e469c6a0d13f81d9d2932acdf6
                                      • Instruction ID: 0f1043a00c079aaf0470a639408b52aefed0a72343b426fc159d419cd0b43c99
                                      • Opcode Fuzzy Hash: 293767f9a57fe0a3ddfedb5a9c8aad8e73de11e469c6a0d13f81d9d2932acdf6
                                      • Instruction Fuzzy Hash: A2E1E774E0025A8FDB54DFA9C580AAEFBB2FF89305F248169D414AB355D731AD42CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1381991022.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2900000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 288ee58ec4b9e13de987058b354565d8acbff20ca471d7382a6308f56360bbf5
                                      • Instruction ID: 96da38c0d9d1fcdc0db45e4a3f5475d67a2cd84c4a7fa99a0ba55b69858c2e21
                                      • Opcode Fuzzy Hash: 288ee58ec4b9e13de987058b354565d8acbff20ca471d7382a6308f56360bbf5
                                      • Instruction Fuzzy Hash: 66A17E36E002098FCF15DFB4C88059EB7B6FF89304B15856AE905AB695DF31EA56CF80

                                      Execution Graph

                                      Execution Coverage:12.2%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:82
                                      Total number of Limit Nodes:6
                                      execution_graph 23718 69664e0 DuplicateHandle 23719 6966576 23718->23719 23720 2b0ced8 23721 2b0cee4 23720->23721 23722 2b0d112 23721->23722 23725 6965182 23721->23725 23729 6965190 23721->23729 23726 6965190 23725->23726 23733 696498c 23726->23733 23730 696519f 23729->23730 23731 696498c 3 API calls 23730->23731 23732 69651c0 23731->23732 23732->23722 23735 6964997 23733->23735 23737 69660dc 23735->23737 23736 6966b46 23736->23736 23738 69660e7 23737->23738 23739 696766c 23738->23739 23741 6968f00 23738->23741 23739->23736 23742 6968f21 23741->23742 23743 6968f45 23742->23743 23746 69690b0 23742->23746 23750 69690a8 23742->23750 23743->23739 23747 69690bd 23746->23747 23748 69690f6 23747->23748 23754 6967304 23747->23754 23748->23743 23751 69690b0 23750->23751 23752 69690f6 23751->23752 23753 6967304 3 API calls 23751->23753 23752->23743 23753->23752 23755 696730f 23754->23755 23757 6969168 23755->23757 23758 6967338 23755->23758 23759 6967343 23758->23759 23765 6967348 23759->23765 23761 69691d7 23769 696e968 23761->23769 23775 696e950 23761->23775 23762 6969211 23762->23757 23768 6967353 23765->23768 23766 696a758 23766->23761 23767 6968f00 3 API calls 23767->23766 23768->23766 23768->23767 23771 696e9e5 23769->23771 23772 696e999 23769->23772 23770 696e9a5 23770->23762 23771->23762 23772->23770 23781 696ebd0 23772->23781 23786 696ebe0 23772->23786 23777 696e9e5 23775->23777 23778 696e999 23775->23778 23776 696e9a5 23776->23762 23777->23762 23778->23776 23779 696ebd0 3 API calls 23778->23779 23780 696ebe0 3 API calls 23778->23780 23779->23777 23780->23777 23782 696ebe0 23781->23782 23790 696ec22 23782->23790 23800 696ec30 23782->23800 23783 696ebea 23783->23771 23788 696ec22 2 API calls 23786->23788 23789 696ec30 2 API calls 23786->23789 23787 696ebea 23787->23771 23788->23787 23789->23787 23791 696ec30 23790->23791 23792 696e114 GetModuleHandleW 23791->23792 23794 696ec64 23791->23794 23793 696ec4c 23792->23793 23793->23794 23798 696eeba GetModuleHandleW 23793->23798 23799 696eec8 GetModuleHandleW 23793->23799 23794->23783 23795 696ec5c 23795->23794 23796 696ee68 GetModuleHandleW 23795->23796 23797 696ee95 23796->23797 23797->23783 23798->23795 23799->23795 23801 696ec41 23800->23801 23804 696ec64 23800->23804 23802 696e114 GetModuleHandleW 23801->23802 23803 696ec4c 23802->23803 23803->23804 23808 696eeba GetModuleHandleW 23803->23808 23809 696eec8 GetModuleHandleW 23803->23809 23804->23783 23805 696ec5c 23805->23804 23806 696ee68 GetModuleHandleW 23805->23806 23807 696ee95 23806->23807 23807->23783 23808->23805 23809->23805 23810 6966298 23811 69662de GetCurrentProcess 23810->23811 23813 6966330 GetCurrentThread 23811->23813 23814 6966329 23811->23814 23815 6966366 23813->23815 23816 696636d GetCurrentProcess 23813->23816 23814->23813 23815->23816 23817 69663a3 23816->23817

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 47 2b0b328-2b0b33b 48 2b0b341-2b0b34a 47->48 49 2b0b47a-2b0b481 47->49 50 2b0b350-2b0b354 48->50 51 2b0b484 48->51 52 2b0b356 50->52 53 2b0b36e-2b0b375 50->53 56 2b0b489-2b0b491 51->56 54 2b0b359-2b0b364 52->54 53->49 55 2b0b37b-2b0b388 53->55 54->51 57 2b0b36a-2b0b36c 54->57 55->49 62 2b0b38e-2b0b3a1 55->62 60 2b0b493-2b0b4ab 56->60 61 2b0b4ad-2b0b4b0 56->61 57->53 57->54 60->61 63 2b0b4b2-2b0b4ca 61->63 64 2b0b4dc 61->64 65 2b0b3a3 62->65 66 2b0b3a6-2b0b3ae 62->66 78 2b0b4d3-2b0b4d6 63->78 79 2b0b4cc-2b0b4d1 63->79 67 2b0b4de-2b0b4e2 64->67 65->66 68 2b0b3b0-2b0b3b6 66->68 69 2b0b41b-2b0b41d 66->69 68->69 72 2b0b3b8-2b0b3be 68->72 69->49 71 2b0b41f-2b0b425 69->71 71->49 74 2b0b427-2b0b431 71->74 72->56 73 2b0b3c4-2b0b3dc 72->73 86 2b0b409-2b0b40c 73->86 87 2b0b3de-2b0b3e4 73->87 74->56 75 2b0b433-2b0b44b 74->75 89 2b0b470-2b0b473 75->89 90 2b0b44d-2b0b453 75->90 81 2b0b4e3-2b0b520 78->81 82 2b0b4d8-2b0b4da 78->82 79->67 93 2b0b522 81->93 94 2b0b527-2b0b604 call 2b03908 call 2b03428 81->94 82->63 82->64 86->51 92 2b0b40e-2b0b411 86->92 87->56 91 2b0b3ea-2b0b3fe 87->91 89->51 96 2b0b475-2b0b478 89->96 90->56 95 2b0b455-2b0b469 90->95 91->56 101 2b0b404 91->101 92->51 97 2b0b413-2b0b419 92->97 93->94 111 2b0b606 94->111 112 2b0b60b-2b0b62c call 2b04dc8 94->112 95->56 102 2b0b46b 95->102 96->49 96->74 97->68 97->69 101->86 102->89 111->112 114 2b0b631-2b0b63c 112->114 115 2b0b643-2b0b647 114->115 116 2b0b63e 114->116 117 2b0b649-2b0b64a 115->117 118 2b0b64c-2b0b653 115->118 116->115 119 2b0b66b-2b0b6af 117->119 120 2b0b655 118->120 121 2b0b65a-2b0b668 118->121 125 2b0b715-2b0b72c 119->125 120->121 121->119 127 2b0b6b1-2b0b6c7 125->127 128 2b0b72e-2b0b753 125->128 132 2b0b6f1 127->132 133 2b0b6c9-2b0b6d5 127->133 135 2b0b755-2b0b76a 128->135 136 2b0b76b 128->136 134 2b0b6f7-2b0b714 132->134 137 2b0b6d7-2b0b6dd 133->137 138 2b0b6df-2b0b6e5 133->138 134->125 135->136 140 2b0b76c 136->140 139 2b0b6ef 137->139 138->139 139->134 140->140
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0o#p$Lj#p$Lj#p
                                      • API String ID: 0-1178635779
                                      • Opcode ID: 72cc94fd8bf23fc33cb71798cdebe3bd3a43c4876590d98a08a282867e4dce23
                                      • Instruction ID: c38b10f7fa415bcd94a423a41f612481136f8252c00678a02287cac9d37355d4
                                      • Opcode Fuzzy Hash: 72cc94fd8bf23fc33cb71798cdebe3bd3a43c4876590d98a08a282867e4dce23
                                      • Instruction Fuzzy Hash: 0FE10B75E00218CFDB15DFA9D984A9DBBB2FF49314F1980A9E819AB3A1D730AD41CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 144 2b0c752-2b0c758 145 2b0c75a-2b0c780 144->145 146 2b0c6dd-2b0c6eb 144->146 147 2b0c782 145->147 148 2b0c787-2b0c7cf 145->148 146->144 147->148 153 2b0c7d7-2b0c7e6 call 2b03908 148->153 155 2b0c7eb-2b0c864 call 2b03428 153->155 161 2b0c866 155->161 162 2b0c86b-2b0c88c call 2b04dc8 155->162 161->162 164 2b0c891-2b0c89c 162->164 165 2b0c8a3-2b0c8a7 164->165 166 2b0c89e 164->166 167 2b0c8a9-2b0c8aa 165->167 168 2b0c8ac-2b0c8b3 165->168 166->165 169 2b0c8cb-2b0c90f 167->169 170 2b0c8b5 168->170 171 2b0c8ba-2b0c8c8 168->171 175 2b0c975-2b0c98c 169->175 170->171 171->169 177 2b0c911-2b0c927 175->177 178 2b0c98e-2b0c9b3 175->178 182 2b0c951 177->182 183 2b0c929-2b0c935 177->183 185 2b0c9b5-2b0c9ca 178->185 186 2b0c9cb 178->186 184 2b0c957-2b0c974 182->184 187 2b0c937-2b0c93d 183->187 188 2b0c93f-2b0c945 183->188 184->175 185->186 189 2b0c94f 187->189 188->189 189->184
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0o#p$Lj#p$Lj#p
                                      • API String ID: 0-1178635779
                                      • Opcode ID: 864cdb7fb5ee0a5cbcbb22863219bca6aeb88209de6a27fb8e5d76058b072721
                                      • Instruction ID: a9cfdb8e184345cdd9898c1b8937dcc5ea5f3e27c3e7c7e7e75f1ccca6e8ed5d
                                      • Opcode Fuzzy Hash: 864cdb7fb5ee0a5cbcbb22863219bca6aeb88209de6a27fb8e5d76058b072721
                                      • Instruction Fuzzy Hash: 3781A374E00218DFDB15DFAAD984B9DBBF2BF89300F1485AAE409AB365DB309945CF14

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 193 2b0c190-2b0c195 194 2b0c1b1-2b0c1c0 193->194 195 2b0c197-2b0c1b0 193->195 196 2b0c1c2 194->196 197 2b0c1c7-2b0c2a4 call 2b03908 call 2b03428 194->197 195->194 196->197 207 2b0c2a6 197->207 208 2b0c2ab-2b0c2cc call 2b04dc8 197->208 207->208 210 2b0c2d1-2b0c2dc 208->210 211 2b0c2e3-2b0c2e7 210->211 212 2b0c2de 210->212 213 2b0c2e9-2b0c2ea 211->213 214 2b0c2ec-2b0c2f3 211->214 212->211 215 2b0c30b-2b0c34f 213->215 216 2b0c2f5 214->216 217 2b0c2fa-2b0c308 214->217 221 2b0c3b5-2b0c3cc 215->221 216->217 217->215 223 2b0c351-2b0c367 221->223 224 2b0c3ce-2b0c3f3 221->224 228 2b0c391 223->228 229 2b0c369-2b0c375 223->229 231 2b0c3f5-2b0c40a 224->231 232 2b0c40b 224->232 230 2b0c397-2b0c3b4 228->230 233 2b0c377-2b0c37d 229->233 234 2b0c37f-2b0c385 229->234 230->221 231->232 235 2b0c38f 233->235 234->235 235->230
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0o#p$Lj#p$Lj#p
                                      • API String ID: 0-1178635779
                                      • Opcode ID: 48724ee95b3999f32000dbe4fab1dc1a5dac502f4a06c706650d35f13eda9c16
                                      • Instruction ID: 000bbac6baeda523a19cb0a6b3a511760bb1fd08e3658874a81e8f633c9b6206
                                      • Opcode Fuzzy Hash: 48724ee95b3999f32000dbe4fab1dc1a5dac502f4a06c706650d35f13eda9c16
                                      • Instruction Fuzzy Hash: DE81A174E002188FDB15DFAAD984A9DBBF2FF89300F15C1AAE419AB365DB309945CF14

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 330 2b0c470-2b0c4a0 331 2b0c4a2 330->331 332 2b0c4a7-2b0c584 call 2b03908 call 2b03428 330->332 331->332 342 2b0c586 332->342 343 2b0c58b-2b0c5bc call 2b04dc8 332->343 342->343 346 2b0c5c3-2b0c5c7 343->346 347 2b0c5be 343->347 348 2b0c5c9-2b0c5ca 346->348 349 2b0c5cc-2b0c5d3 346->349 347->346 350 2b0c5eb-2b0c62f 348->350 351 2b0c5d5 349->351 352 2b0c5da-2b0c5e8 349->352 356 2b0c695-2b0c6ac 350->356 351->352 352->350 358 2b0c631-2b0c647 356->358 359 2b0c6ae-2b0c6d3 356->359 363 2b0c671 358->363 364 2b0c649-2b0c655 358->364 365 2b0c6d5-2b0c6d8 359->365 366 2b0c6eb-2b0c758 359->366 369 2b0c677-2b0c694 363->369 367 2b0c657-2b0c65d 364->367 368 2b0c65f-2b0c665 364->368 370 2b0c6dd-2b0c6ea 365->370 366->370 374 2b0c75a-2b0c780 366->374 371 2b0c66f 367->371 368->371 369->356 370->366 371->369 376 2b0c782 374->376 377 2b0c787-2b0c864 call 2b03908 call 2b03428 374->377 376->377 388 2b0c866 377->388 389 2b0c86b-2b0c88c call 2b04dc8 377->389 388->389 391 2b0c891-2b0c89c 389->391 392 2b0c8a3-2b0c8a7 391->392 393 2b0c89e 391->393 394 2b0c8a9-2b0c8aa 392->394 395 2b0c8ac-2b0c8b3 392->395 393->392 396 2b0c8cb-2b0c90f 394->396 397 2b0c8b5 395->397 398 2b0c8ba-2b0c8c8 395->398 402 2b0c975-2b0c98c 396->402 397->398 398->396 404 2b0c911-2b0c927 402->404 405 2b0c98e-2b0c9b3 402->405 409 2b0c951 404->409 410 2b0c929-2b0c935 404->410 412 2b0c9b5-2b0c9ca 405->412 413 2b0c9cb 405->413 411 2b0c957-2b0c974 409->411 414 2b0c937-2b0c93d 410->414 415 2b0c93f-2b0c945 410->415 411->402 412->413 416 2b0c94f 414->416 415->416 416->411
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0o#p$Lj#p$Lj#p
                                      • API String ID: 0-1178635779
                                      • Opcode ID: f8b15c1f8139287b725caacd047f9b6dd6e28896626c6f8c38e431b168e93a1a
                                      • Instruction ID: 9d692a3aca2ee8357a77d02fecec6c80f6dbda3889e3baa0b08c3561b24bcf4d
                                      • Opcode Fuzzy Hash: f8b15c1f8139287b725caacd047f9b6dd6e28896626c6f8c38e431b168e93a1a
                                      • Instruction Fuzzy Hash: CE81A374E00218CFDB15DFAAD984A9DBBF2BF89300F14D1AAE409AB365DB305945CF10

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 239 2b04ad9-2b04b08 240 2b04b0a 239->240 241 2b04b0f-2b04bec call 2b03908 call 2b03428 239->241 240->241 251 2b04bf3-2b04c11 241->251 252 2b04bee 241->252 282 2b04c14 call 2b04dc8 251->282 283 2b04c14 call 2b04db9 251->283 252->251 253 2b04c1a-2b04c25 254 2b04c27 253->254 255 2b04c2c-2b04c30 253->255 254->255 256 2b04c32-2b04c33 255->256 257 2b04c35-2b04c3c 255->257 258 2b04c54-2b04c98 256->258 259 2b04c43-2b04c51 257->259 260 2b04c3e 257->260 264 2b04cfe-2b04d15 258->264 259->258 260->259 266 2b04d17-2b04d3c 264->266 267 2b04c9a-2b04cb0 264->267 274 2b04d54 266->274 275 2b04d3e-2b04d53 266->275 271 2b04cb2-2b04cbe 267->271 272 2b04cda 267->272 276 2b04cc0-2b04cc6 271->276 277 2b04cc8-2b04cce 271->277 273 2b04ce0-2b04cfd 272->273 273->264 275->274 278 2b04cd8 276->278 277->278 278->273 282->253 283->253
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0o#p$Lj#p$Lj#p
                                      • API String ID: 0-1178635779
                                      • Opcode ID: 2e435e6f0c2f36e926332c9d2f700b5a39684a183d1e528f573cae43ac2cd91a
                                      • Instruction ID: 50ecb91c376b2f7aa81e6154ebaafd73f5217993fa433f7eb1d5ea40abed80a3
                                      • Opcode Fuzzy Hash: 2e435e6f0c2f36e926332c9d2f700b5a39684a183d1e528f573cae43ac2cd91a
                                      • Instruction Fuzzy Hash: 48819274E00218DFDB55DFAAD984A9DBBF2FF89300F1480A9D919AB365DB309985CF10

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 420 2b0ca32-2b0ca60 421 2b0ca62 420->421 422 2b0ca67-2b0cb44 call 2b03908 call 2b03428 420->422 421->422 432 2b0cb46 422->432 433 2b0cb4b-2b0cb6c call 2b04dc8 422->433 432->433 435 2b0cb71-2b0cb7c 433->435 436 2b0cb83-2b0cb87 435->436 437 2b0cb7e 435->437 438 2b0cb89-2b0cb8a 436->438 439 2b0cb8c-2b0cb93 436->439 437->436 440 2b0cbab-2b0cbef 438->440 441 2b0cb95 439->441 442 2b0cb9a-2b0cba8 439->442 446 2b0cc55-2b0cc6c 440->446 441->442 442->440 448 2b0cbf1-2b0cc07 446->448 449 2b0cc6e-2b0cc93 446->449 453 2b0cc31 448->453 454 2b0cc09-2b0cc15 448->454 455 2b0cc95-2b0ccaa 449->455 456 2b0ccab 449->456 459 2b0cc37-2b0cc54 453->459 457 2b0cc17-2b0cc1d 454->457 458 2b0cc1f-2b0cc25 454->458 455->456 460 2b0cc2f 457->460 458->460 459->446 460->459
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0o#p$Lj#p$Lj#p
                                      • API String ID: 0-1178635779
                                      • Opcode ID: 71a697c41c4f93d1dc51f868ebb674440a321d762b8af50bda1edba85a80ad78
                                      • Instruction ID: 46f79ea0c562fc2f02e52618d9fe42483623940943c0462b1a15082a242d212e
                                      • Opcode Fuzzy Hash: 71a697c41c4f93d1dc51f868ebb674440a321d762b8af50bda1edba85a80ad78
                                      • Instruction Fuzzy Hash: F681A474E00218CFDB15DFAAD984A9DBBF2FF89300F1481AAE819AB365DB305945CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 284 2b0beb2-2b0beb9 285 2b0bed5-2b0bee0 284->285 286 2b0bebb-2b0bed0 284->286 287 2b0bee2 285->287 288 2b0bee7-2b0bfc4 call 2b03908 call 2b03428 285->288 286->285 287->288 298 2b0bfc6 288->298 299 2b0bfcb-2b0bfec call 2b04dc8 288->299 298->299 301 2b0bff1-2b0bffc 299->301 302 2b0c003-2b0c007 301->302 303 2b0bffe 301->303 304 2b0c009-2b0c00a 302->304 305 2b0c00c-2b0c013 302->305 303->302 306 2b0c02b-2b0c06f 304->306 307 2b0c015 305->307 308 2b0c01a-2b0c028 305->308 312 2b0c0d5-2b0c0ec 306->312 307->308 308->306 314 2b0c071-2b0c087 312->314 315 2b0c0ee-2b0c113 312->315 319 2b0c0b1 314->319 320 2b0c089-2b0c095 314->320 321 2b0c115-2b0c12a 315->321 322 2b0c12b 315->322 325 2b0c0b7-2b0c0d4 319->325 323 2b0c097-2b0c09d 320->323 324 2b0c09f-2b0c0a5 320->324 321->322 326 2b0c0af 323->326 324->326 325->312 326->325
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0o#p$Lj#p$Lj#p
                                      • API String ID: 0-1178635779
                                      • Opcode ID: b8fab8d5cc2cf2fadc31c06620982949fdbad38c20972b94b845a051f7277631
                                      • Instruction ID: 77de8a5238d954c5c21c8765a143b5558b925a4022785283469ada5a9a98799d
                                      • Opcode Fuzzy Hash: b8fab8d5cc2cf2fadc31c06620982949fdbad38c20972b94b845a051f7277631
                                      • Instruction Fuzzy Hash: 6281A374E00218CFDB15DFAAD984A9DBBF2FF89314F1481AAD419AB365DB309945CF10

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 464 2b0bbd2-2b0bc00 465 2b0bc02 464->465 466 2b0bc07-2b0bce4 call 2b03908 call 2b03428 464->466 465->466 476 2b0bce6 466->476 477 2b0bceb-2b0bd0c call 2b04dc8 466->477 476->477 479 2b0bd11-2b0bd1c 477->479 480 2b0bd23-2b0bd27 479->480 481 2b0bd1e 479->481 482 2b0bd29-2b0bd2a 480->482 483 2b0bd2c-2b0bd33 480->483 481->480 484 2b0bd4b-2b0bd8f 482->484 485 2b0bd35 483->485 486 2b0bd3a-2b0bd48 483->486 490 2b0bdf5-2b0be0c 484->490 485->486 486->484 492 2b0bd91-2b0bda7 490->492 493 2b0be0e-2b0be33 490->493 497 2b0bdd1 492->497 498 2b0bda9-2b0bdb5 492->498 500 2b0be35-2b0be4a 493->500 501 2b0be4b 493->501 499 2b0bdd7-2b0bdf4 497->499 502 2b0bdb7-2b0bdbd 498->502 503 2b0bdbf-2b0bdc5 498->503 499->490 500->501 504 2b0bdcf 502->504 503->504 504->499
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0o#p$Lj#p$Lj#p
                                      • API String ID: 0-1178635779
                                      • Opcode ID: ed7e61c95e8d0fdceb9946fb660d61d08e485546adb47bcf086d357c836b6dad
                                      • Instruction ID: 75440cf45b7d557a500e5f5bf26c9c8760fa64ae9d87c1277a5ba4538ea52389
                                      • Opcode Fuzzy Hash: ed7e61c95e8d0fdceb9946fb660d61d08e485546adb47bcf086d357c836b6dad
                                      • Instruction Fuzzy Hash: D5818F74E00218CFDB15DFAAD984A9DFBF2BF89304F1481A9E419AB365DB309945CF10

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 586 2b0b4f2-2b0b4f9 587 2b0b515-2b0b520 586->587 588 2b0b4fb-2b0b510 586->588 589 2b0b522 587->589 590 2b0b527-2b0b604 call 2b03908 call 2b03428 587->590 588->587 589->590 600 2b0b606 590->600 601 2b0b60b-2b0b62c call 2b04dc8 590->601 600->601 603 2b0b631-2b0b63c 601->603 604 2b0b643-2b0b647 603->604 605 2b0b63e 603->605 606 2b0b649-2b0b64a 604->606 607 2b0b64c-2b0b653 604->607 605->604 608 2b0b66b-2b0b6af 606->608 609 2b0b655 607->609 610 2b0b65a-2b0b668 607->610 614 2b0b715-2b0b72c 608->614 609->610 610->608 616 2b0b6b1-2b0b6c7 614->616 617 2b0b72e-2b0b753 614->617 621 2b0b6f1 616->621 622 2b0b6c9-2b0b6d5 616->622 624 2b0b755-2b0b76a 617->624 625 2b0b76b 617->625 623 2b0b6f7-2b0b714 621->623 626 2b0b6d7-2b0b6dd 622->626 627 2b0b6df-2b0b6e5 622->627 623->614 624->625 629 2b0b76c 625->629 628 2b0b6ef 626->628 627->628 628->623 629->629
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0o#p
                                      • API String ID: 0-2085137917
                                      • Opcode ID: 00c70654d7a2d8715144489de5f87bcff0adef7e97b00a404747d1dd472ae184
                                      • Instruction ID: 1b4c3587e255edfe8f3fc08a145241920f020860b6cb7f184dd504ef0e7ed9d5
                                      • Opcode Fuzzy Hash: 00c70654d7a2d8715144489de5f87bcff0adef7e97b00a404747d1dd472ae184
                                      • Instruction Fuzzy Hash: CB61A1B4E006089FEB19DFAAD984A9DBBF2FF89304F14C069E419AB365DB345941CF10
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a2ba4da2fc700f688ac00e2399d5f3d8aea477e9b32bbb163506c63341cc762d
                                      • Instruction ID: 3e87fe0a42565b84fcbf151854b036ab9166c2b11e9a3135b2ec2f482a2cc759
                                      • Opcode Fuzzy Hash: a2ba4da2fc700f688ac00e2399d5f3d8aea477e9b32bbb163506c63341cc762d
                                      • Instruction Fuzzy Hash: D6728171A00609DFCB16CF68C984AAEBFF2FF89304F158995E9459B2A1D730ED81CB50
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4d6adfbb27f1151b3656f6fb0f85df1be30128bfef467bd5b2f2f498c57a9d5d
                                      • Instruction ID: e1ef82d2fb470cd720ba2dadb5758eaab24f83fce9e94d20039626e8ae66d5b5
                                      • Opcode Fuzzy Hash: 4d6adfbb27f1151b3656f6fb0f85df1be30128bfef467bd5b2f2f498c57a9d5d
                                      • Instruction Fuzzy Hash: BF12A170A002189FDB15DFA9C994BAEBBFAFF88340F148559E406EB394DB349D51CB90
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 979bba67f9ab045c87a3757c3ec232bfa2688c7d649a3ef12a95c5b15c698cad
                                      • Instruction ID: 10facb92cc036bfa951c6ebd4e3d607eaf0970ae2a74764c840950d23c08fac7
                                      • Opcode Fuzzy Hash: 979bba67f9ab045c87a3757c3ec232bfa2688c7d649a3ef12a95c5b15c698cad
                                      • Instruction Fuzzy Hash: A4D11970A00119DFCB16DFA9C9C4AADBFFAFF88344F1581A5E415AB2A5D730E861CB50

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3848284688.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6960000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Current$Process$Thread
                                      • String ID:
                                      • API String ID: 3242834020-0
                                      • Opcode ID: 7604cc3e9a7ad9e11630a0267161c49eec06fbb13d7cddc3d0fd9af6d4e1acd8
                                      • Instruction ID: 23ac15095bcfcded98a9f19f719ba87ce0f05baed4a096a6262ba34458e1b78b
                                      • Opcode Fuzzy Hash: 7604cc3e9a7ad9e11630a0267161c49eec06fbb13d7cddc3d0fd9af6d4e1acd8
                                      • Instruction Fuzzy Hash: D85166B09017498FDB44CFAAD948B9EBBF1FF88300F24805AE409A7790D775A944CF66

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3848284688.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6960000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Current$Process$Thread
                                      • String ID:
                                      • API String ID: 3242834020-0
                                      • Opcode ID: 0e57edcacc88dc652522859b3ff71de711cddb5c777b218323dced1ca4033054
                                      • Instruction ID: 9376977215af211cabc7fea0a618b70489b60ff42257dc37ed3cdb0b78e7cc75
                                      • Opcode Fuzzy Hash: 0e57edcacc88dc652522859b3ff71de711cddb5c777b218323dced1ca4033054
                                      • Instruction Fuzzy Hash: 685154B09017498FDB44CFAAD948B9EBBF1EF88304F20805AE409A7790D775A944CF66

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 508 696ec30-696ec3f 509 696ec41-696ec4e call 696e114 508->509 510 696ec6b-696ec6f 508->510 517 696ec64 509->517 518 696ec50 509->518 511 696ec83-696ecc4 510->511 512 696ec71-696ec7b 510->512 519 696ecc6-696ecce 511->519 520 696ecd1-696ecdf 511->520 512->511 517->510 564 696ec56 call 696eeba 518->564 565 696ec56 call 696eec8 518->565 519->520 522 696ed03-696ed05 520->522 523 696ece1-696ece6 520->523 521 696ec5c-696ec5e 521->517 524 696eda0-696ee60 521->524 525 696ed08-696ed0f 522->525 526 696ecf1 523->526 527 696ece8-696ecef call 696e120 523->527 559 696ee62-696ee65 524->559 560 696ee68-696ee93 GetModuleHandleW 524->560 529 696ed11-696ed19 525->529 530 696ed1c-696ed23 525->530 528 696ecf3-696ed01 526->528 527->528 528->525 529->530 532 696ed25-696ed2d 530->532 533 696ed30-696ed39 call 6967060 530->533 532->533 539 696ed46-696ed4b 533->539 540 696ed3b-696ed43 533->540 541 696ed4d-696ed54 539->541 542 696ed69-696ed6d 539->542 540->539 541->542 544 696ed56-696ed66 call 696c1e4 call 696e130 541->544 566 696ed70 call 696f188 542->566 567 696ed70 call 696f178 542->567 544->542 545 696ed73-696ed76 548 696ed78-696ed96 545->548 549 696ed99-696ed9f 545->549 548->549 559->560 561 696ee95-696ee9b 560->561 562 696ee9c-696eeb0 560->562 561->562 564->521 565->521 566->545 567->545
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3848284688.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6960000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: bfaefb322819e9c4a0a3d9f9f7997eea262ffc05eefe3fb2777dfc19db79190a
                                      • Instruction ID: b32ada9a335c24bae471c638041f226f09dd7bca814fea628e4523322fd88e49
                                      • Opcode Fuzzy Hash: bfaefb322819e9c4a0a3d9f9f7997eea262ffc05eefe3fb2777dfc19db79190a
                                      • Instruction Fuzzy Hash: E0817774A00B058FEBA4DF2AD55475ABBF5FF88300F10892EE44ADBA40D774E849CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 568 69664d8-69664db 569 69664e0-6966574 DuplicateHandle 568->569 570 6966576-696657c 569->570 571 696657d-696659a 569->571 570->571
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06966567
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3848284688.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6960000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: edd104639dd46e95791f736fc4aaf9ea74f249b352b08b101cadd2ea9e5a6e06
                                      • Instruction ID: 6ed39d3440cf5400d7605d589716a0ddd5240f2fe8ee4d8f409811dac3e8b82a
                                      • Opcode Fuzzy Hash: edd104639dd46e95791f736fc4aaf9ea74f249b352b08b101cadd2ea9e5a6e06
                                      • Instruction Fuzzy Hash: 4B21E3B59003499FDB10CFAAD985ADEBFF8EB48310F14801AE915A3750D378A954CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 574 69664e0-6966574 DuplicateHandle 575 6966576-696657c 574->575 576 696657d-696659a 574->576 575->576
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06966567
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3848284688.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6960000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 655dbbc5d500118bc6af8786ff9912162e62841c08fea3c9a6e706462440ae7c
                                      • Instruction ID: 6787693c2516068c322be156631aa1af9ed9746ce15b5ebed2baafa4857af04d
                                      • Opcode Fuzzy Hash: 655dbbc5d500118bc6af8786ff9912162e62841c08fea3c9a6e706462440ae7c
                                      • Instruction Fuzzy Hash: AC21C2B5D003499FDB10CFAAD985ADEBFF8EB48310F14841AE918A3750D378A954CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 579 696e114-696ee60 581 696ee62-696ee65 579->581 582 696ee68-696ee93 GetModuleHandleW 579->582 581->582 583 696ee95-696ee9b 582->583 584 696ee9c-696eeb0 582->584 583->584
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0696EC4C), ref: 0696EE86
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3848284688.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_6960000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 7d5a73399fe14bb3b37c46d65b083c17692a0f62240f801dffd10e7189023e13
                                      • Instruction ID: f5abd5676b13715863d01d06743e8d7f5c852288857792f30b60382700c2e7a2
                                      • Opcode Fuzzy Hash: 7d5a73399fe14bb3b37c46d65b083c17692a0f62240f801dffd10e7189023e13
                                      • Instruction Fuzzy Hash: 061102BAC047498FDB10DF9AD444BAEFBF4EB49210F10842AE829B7740D375A545CFA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: T
                                      • API String ID: 0-286829874
                                      • Opcode ID: 531cdcabf817ccf1741cdadc72a7332bfeebe486472abdbec013310b4f6beb5c
                                      • Instruction ID: 72365d9195517220f1af0be47e7053851c71c50e3832bb2568173438715abef9
                                      • Opcode Fuzzy Hash: 531cdcabf817ccf1741cdadc72a7332bfeebe486472abdbec013310b4f6beb5c
                                      • Instruction Fuzzy Hash: 8421C4B4C052498FCB05EFA8D9855EDBFF0BB49300F10556AD819B7250EB305A95CBA1
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0b54602567dde732d43846063617d81bbf0fec7eac44fc1ee159b467a7f5d6e6
                                      • Instruction ID: c24dd74a5530bb36d207ae1973359315d26cf9d496f5abfe18f3be8ca4db0d04
                                      • Opcode Fuzzy Hash: 0b54602567dde732d43846063617d81bbf0fec7eac44fc1ee159b467a7f5d6e6
                                      • Instruction Fuzzy Hash: F452F134A002188FEB15DBE0D860B9EBBB2FF88300F1481A9D10A6B7A5DF359E45DF55
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b004ceb5320cc40a005430d214d033cfb464c97edc61dcbf6d19e0dcd55c8f1a
                                      • Instruction ID: d7cb7f0735b94158daee8b45d8231d6b93e7a2f5bb4fde002ac0842d2e823061
                                      • Opcode Fuzzy Hash: b004ceb5320cc40a005430d214d033cfb464c97edc61dcbf6d19e0dcd55c8f1a
                                      • Instruction Fuzzy Hash: 70124631A006089FCB16DF68D884E9EFBF2EF89314F158599E8499B2A1DB30FD41CB50
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e3bf4e8df99a1ec4657578d8aa48356eb87d7f17d98fe8c9d25b489497a8b563
                                      • Instruction ID: 42e8c1c332ca622c74329c4542e4868985f5b3f6ae53c00b038fb549da4792a3
                                      • Opcode Fuzzy Hash: e3bf4e8df99a1ec4657578d8aa48356eb87d7f17d98fe8c9d25b489497a8b563
                                      • Instruction Fuzzy Hash: 6CF13C71A402148FCB15CF6DD8C4AADBBF2FF88354B1A8599E615AB3A1CB31EC41CB50
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4bb38e809615f6a375b5027f95dc1caacc69abb08839d33bc48e2f1268e7fc4b
                                      • Instruction ID: 5f05e8fb8b4bb7828b1657b6ebc6d9b5867f63a6baf61263487cc9b0b33303d8
                                      • Opcode Fuzzy Hash: 4bb38e809615f6a375b5027f95dc1caacc69abb08839d33bc48e2f1268e7fc4b
                                      • Instruction Fuzzy Hash: 0922EA74D00219CFCB55EF64E984A9DBBB2FF48314F1089A9D809AB754DB306E85CF91
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e82fecb2eb42962a975ee5f257960cc06c67ea99eea296d60c253d7abb359bb0
                                      • Instruction ID: e817bf61e63dfe4063d1388fb45f79a2927f27c327417ee0e4626109e62172a6
                                      • Opcode Fuzzy Hash: e82fecb2eb42962a975ee5f257960cc06c67ea99eea296d60c253d7abb359bb0
                                      • Instruction Fuzzy Hash: 7122DA74D00219CFCB55EF64E984A9DBBB2FF48315F1089A9D809AB754DB306E85CF81
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3f01ffafb66e101a25534fa5f5062ef4f6c43b8a3bb724a6cc02a561c3764cae
                                      • Instruction ID: 875a4731041434efa48e064563d807b4e1cbba97451a38ecc5f880ab7e478fdc
                                      • Opcode Fuzzy Hash: 3f01ffafb66e101a25534fa5f5062ef4f6c43b8a3bb724a6cc02a561c3764cae
                                      • Instruction Fuzzy Hash: A3B17C707146018FEB169B29C9E8B393B96EF85644F1804EAE142CF3E1EB26DE42C741
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8f11878e667e40ac7b5865f00712a0f8c5ad7e9d1a278fdca0aceb62f2d367e1
                                      • Instruction ID: 9d33dbc40a35e38c1d1cef8dd7f78c76618a18b075b536ad6f58921a6670dbe8
                                      • Opcode Fuzzy Hash: 8f11878e667e40ac7b5865f00712a0f8c5ad7e9d1a278fdca0aceb62f2d367e1
                                      • Instruction Fuzzy Hash: 7391DD31B04200CFDB269F64D898B6E7BE6FB88340F5489A9E8468B381DF749C41CB94
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8a71590994e958b0b4e73c5547701788490a59f19ec569f8f4eab39b2e14d763
                                      • Instruction ID: 32135d7d386e46582defbac2defe386996a2f417f1f7db1e80a8641a2106df88
                                      • Opcode Fuzzy Hash: 8a71590994e958b0b4e73c5547701788490a59f19ec569f8f4eab39b2e14d763
                                      • Instruction Fuzzy Hash: B2918D70B007059FDB55EF79D88092EBBE2FF883007108669D44ACBB51EB70E846CB94
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 01f6d3500d9e7fc93139c0f5e08191acf72b51bbeacf9f4b6cdf5532dd905750
                                      • Instruction ID: e6e5ada559d6105d4b7793f511f91e2682484f84656c09c402a17678764e92c5
                                      • Opcode Fuzzy Hash: 01f6d3500d9e7fc93139c0f5e08191acf72b51bbeacf9f4b6cdf5532dd905750
                                      • Instruction Fuzzy Hash: 90819431B00505DFCB25CF69C8C8AA9BBB2FF89204B9481AAD405E7BA5DB31EC41CF50
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fdc873432ce8ed1cb4811ed65ce6b78658623b24dd53a8f2873267ad54057913
                                      • Instruction ID: b9a6a1b6cd1501fff7441e58e6f011eb3fb32261bbeb8c5f08a187ee344f0524
                                      • Opcode Fuzzy Hash: fdc873432ce8ed1cb4811ed65ce6b78658623b24dd53a8f2873267ad54057913
                                      • Instruction Fuzzy Hash: 1A71D734B006058FCB16DF68C498AADBBE6EF49644B1944E9E806CB3B1DF70EC51DB90
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 06beb332e4499bed9177c6347f28906c9f4bf236a6609143fe5b37aa91ba36c7
                                      • Instruction ID: 0d9ec8d1aa30b431543753567711ba8f906445025764c4be00da38571ca23647
                                      • Opcode Fuzzy Hash: 06beb332e4499bed9177c6347f28906c9f4bf236a6609143fe5b37aa91ba36c7
                                      • Instruction Fuzzy Hash: EF713574A043299FDB16DFA4D8589ADBFB3FF88700F148129E506AB690DB349942DF44
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4f4908b419193fe58215893720d8edfcd9dad534c7fe04501f7f8455bf02f23b
                                      • Instruction ID: 2d72fce606b64d7f2d924dfd69e6ad5379bfbf6ce0bbb986b9c08beee1039d04
                                      • Opcode Fuzzy Hash: 4f4908b419193fe58215893720d8edfcd9dad534c7fe04501f7f8455bf02f23b
                                      • Instruction Fuzzy Hash: 8A51D0318A1743CFD3086F35E9AC16EBBA5FB4F3A3744AD14B15E92025DBB058A9CA11
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 75dcfb033a96785d28c724c379e26249a8572dd1f834007e12cc6ebacbe6c132
                                      • Instruction ID: e0366af05146e629d303e591411165e7b804325370d7b548b7fadddad29b46c8
                                      • Opcode Fuzzy Hash: 75dcfb033a96785d28c724c379e26249a8572dd1f834007e12cc6ebacbe6c132
                                      • Instruction Fuzzy Hash: 0451AF318A1747CFD3086F35E9AC16EBBA5FB4F3A3744AD14B15E92025CB7058A9CA21
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 668281cdb23cd1ed6eab852e764f4c55be9dc3b3805d0c7aa39d50d79fcd6709
                                      • Instruction ID: 6b328ef243ef5c1e086f2b6a2265450565ae3a6c75f950c98b139469e736e2d3
                                      • Opcode Fuzzy Hash: 668281cdb23cd1ed6eab852e764f4c55be9dc3b3805d0c7aa39d50d79fcd6709
                                      • Instruction Fuzzy Hash: 12415B71901219DFD704AF61D46C7FE7BB1EB8A315F104869D215632E0CBB90A88CF91
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5480ccfd72ea0852e753452f81545f68220034fe381c876e2c1f7963ac86a409
                                      • Instruction ID: cd54ac4786cd0def46f0244c2bad1dfb13326f73e5bf058a0031a516543d85dd
                                      • Opcode Fuzzy Hash: 5480ccfd72ea0852e753452f81545f68220034fe381c876e2c1f7963ac86a409
                                      • Instruction Fuzzy Hash: EA519175E01208DFDB44DFAAD98499DBBF2FF89300F209169E819AB365DB30A945CF50
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c8a44bece6606414c1237f44e818b21485f393410311c372d245ad37a47e6cb7
                                      • Instruction ID: 385e4054c861dbad723f27d722423577a5527e7f0808e84bf121ea4e60485a65
                                      • Opcode Fuzzy Hash: c8a44bece6606414c1237f44e818b21485f393410311c372d245ad37a47e6cb7
                                      • Instruction Fuzzy Hash: 8C519F75E01208CFCB48DFA9D99499DBBF2FF89305B209469E809BB364DB31A945CF50
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d384998856c994a0d66f55a40944b0d993ffacc40e973ea55866f1e582a15a6a
                                      • Instruction ID: e755cd0aabf838de4a50d0eb14f4898c6127f4f4403ee76c5a6f3200b7408daf
                                      • Opcode Fuzzy Hash: d384998856c994a0d66f55a40944b0d993ffacc40e973ea55866f1e582a15a6a
                                      • Instruction Fuzzy Hash: E941A130B043069FDB55EB36D89097EBBE2EF883107048569D456C7A81EF30E806CB91
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 789c4c8a7925b237649781bffa265b4c11cc0f55f18b7bc4a32b8a08056bae75
                                      • Instruction ID: 42a74a02a67a2f5bddd59475cb962556d45ec4483f64f4bb216274a13923944c
                                      • Opcode Fuzzy Hash: 789c4c8a7925b237649781bffa265b4c11cc0f55f18b7bc4a32b8a08056bae75
                                      • Instruction Fuzzy Hash: FE41A231A04649DFCF12CFA5C884B9EBFB2EF49754F048595E815AB2E2D374E950CB90
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e767d9387a798059ef8de61989d3610a278baeda4c46187902ce55aef0e83f0f
                                      • Instruction ID: 5ebd24479ed0e8bb0db0513b2c7f8d38cf857fb7628377d8dbafa2f87747351a
                                      • Opcode Fuzzy Hash: e767d9387a798059ef8de61989d3610a278baeda4c46187902ce55aef0e83f0f
                                      • Instruction Fuzzy Hash: 6941F231B006049FCB169B79D854AAEBBF6EBC9250F1484A9E506E7391DE319C01CBA0
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 782e90607f23e7c3981330bc955ded41f7ced243c74f7a115fed98759c8520db
                                      • Instruction ID: 234402b1e0b26e45f785d41218699a0f509c4a434636bb26b1545ffee1d125c3
                                      • Opcode Fuzzy Hash: 782e90607f23e7c3981330bc955ded41f7ced243c74f7a115fed98759c8520db
                                      • Instruction Fuzzy Hash: 73410174E0420ACFCB16DFE8E484AADBBB2FB49305F609599D40AA72C4D774A841CF64
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 54da61f989d8ef7475d4096ff4171246693feef39e68934894bc10cffef1c5b0
                                      • Instruction ID: baecda4536b2240a60251f1d385c83191ac05fc1436169b8cd3a39849bfc0482
                                      • Opcode Fuzzy Hash: 54da61f989d8ef7475d4096ff4171246693feef39e68934894bc10cffef1c5b0
                                      • Instruction Fuzzy Hash: E831F571B003158BDF1A8AB659DC37E6ADAEBC4254F1C44F9D806DB3D1DB75CC048651
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 97ac21c923a90e5ecef9afcec4d17933dbe347a68bffb94f15c482814010316c
                                      • Instruction ID: 05325a6765d980403a19cae7ce94fc08bb5f36e63e48907c1490be0683442346
                                      • Opcode Fuzzy Hash: 97ac21c923a90e5ecef9afcec4d17933dbe347a68bffb94f15c482814010316c
                                      • Instruction Fuzzy Hash: 4141F174E0420ACFCB06DFE8E4846EDBBB2FB49305F609599E409A7294D774A841CF64
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03a3c03cecb6a61ac745682e646ac13df58cf50b9f660b3a480dc127a2af2bfe
                                      • Instruction ID: d8c0ac1a40de0e75ef3eedcb81306d1d2cb9a3c5fa15408e38f11c7bfaf71ca7
                                      • Opcode Fuzzy Hash: 03a3c03cecb6a61ac745682e646ac13df58cf50b9f660b3a480dc127a2af2bfe
                                      • Instruction Fuzzy Hash: A641E130A00208DFDB128F64C944BAEBFFAEB44304F0488AAE8559B281D775ED65CF91
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c83f9d2b4a6d67ffdd10e0c9c35fcd6b293b8ba06a2907fef2da0512571453ca
                                      • Instruction ID: b8a253eb686432334a6fe0f55ab68d142b791029ad4bf416f824c3a257f33c7d
                                      • Opcode Fuzzy Hash: c83f9d2b4a6d67ffdd10e0c9c35fcd6b293b8ba06a2907fef2da0512571453ca
                                      • Instruction Fuzzy Hash: 4B41F174E0420ACFDB06DFE8E4846EDBBB2FB49305F209599D409A72D4D774A841CF54
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2ce92f94700df9f09c0ffffada0216a2b3a0881cc2bc802630e3d613fd141e74
                                      • Instruction ID: d00676ab049f2fc4ed22f2063b794352865dc8741d6cb293c88428804160c796
                                      • Opcode Fuzzy Hash: 2ce92f94700df9f09c0ffffada0216a2b3a0881cc2bc802630e3d613fd141e74
                                      • Instruction Fuzzy Hash: 3D41E370E01209CFDB09DFA9D484AEEFBB2FB89304F14D569D408A7294DB75A841CF64
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30c5ff510988d93d26a4523f21c5f3c89006ec587fa205c6aff3c0e8e30a669b
                                      • Instruction ID: 29f50ffed6f15583acd35d460472bc628f02a51563a7971055b9dd1d7248da2f
                                      • Opcode Fuzzy Hash: 30c5ff510988d93d26a4523f21c5f3c89006ec587fa205c6aff3c0e8e30a669b
                                      • Instruction Fuzzy Hash: 85318F7164010A9FCF0A9F64E894AAF7FB6FB88345F104464FA558B291CF35CD61DBA0
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 740b126f2470628774254949a71f02ef78dbcb098fbe81f79aa4b011ffc52366
                                      • Instruction ID: 0a68542ee9c22252ec80f644206b6e414ac4c03490a92beff83ec18b7de7b0ea
                                      • Opcode Fuzzy Hash: 740b126f2470628774254949a71f02ef78dbcb098fbe81f79aa4b011ffc52366
                                      • Instruction Fuzzy Hash: C731D270B057159BDB32DBA4C5807BEBFB5EF89750F0481A8D816A7AA0CF70A844CBD1
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5fd4dc99fe6f7984a85bd04d350e4d71dafe10865efa67ac75e7bb1f80b5252c
                                      • Instruction ID: 9ce6e60c7805fbfdba4385e87c76d3458ba75f08ca460e3e2e4598cfba5da6df
                                      • Opcode Fuzzy Hash: 5fd4dc99fe6f7984a85bd04d350e4d71dafe10865efa67ac75e7bb1f80b5252c
                                      • Instruction Fuzzy Hash: A72190383042005BEB1A562588D4B7EFA97DFC4699F1840B8D502CB7D8EE25FC42E680
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bb28b7043b113ca8dbc956880aabbb4a963886cb253274aea42c6ec2a88667d6
                                      • Instruction ID: ddc97d14c521fbc4be23f29da0d6e297616c187ff5418a565591875cb8a568b2
                                      • Opcode Fuzzy Hash: bb28b7043b113ca8dbc956880aabbb4a963886cb253274aea42c6ec2a88667d6
                                      • Instruction Fuzzy Hash: 6231AF34B043198BDB26DFB5C4546AEBFB3AF89250F04846DE806AB791DF348842CB60
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 561d4f6e3237cc1910f9769c984385fbfc816f79487cac40bb7660d23e5e11a7
                                      • Instruction ID: 6bf169b9babf5ab6d6d1df5346876d50194be86b019a408e6834fea882103750
                                      • Opcode Fuzzy Hash: 561d4f6e3237cc1910f9769c984385fbfc816f79487cac40bb7660d23e5e11a7
                                      • Instruction Fuzzy Hash: 3C317070F406058FCB05CF69C884AAEBBB2FF89354B158655E655A73A5CB34EC42CB90
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cf2a037112e5851a57bbfdb53f5b0b343dc6a7431c946354399eb778e835e733
                                      • Instruction ID: c84a3b7da67b1cb4f467188079499343c9d28babc77496c57ffb9dc2781222f9
                                      • Opcode Fuzzy Hash: cf2a037112e5851a57bbfdb53f5b0b343dc6a7431c946354399eb778e835e733
                                      • Instruction Fuzzy Hash: EA217A71D002099FDB09DFAAD8446EEBBB6EBCA300F04D465D418B72E4DBB09549CE64
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d6bbea1562c8dc790eac733a1505cbc9b7cf5da2162cbc25aeff47a21725e26a
                                      • Instruction ID: d18e98034a744070cf7111e4420f281180b96a16c913fdc55707407835f6e53d
                                      • Opcode Fuzzy Hash: d6bbea1562c8dc790eac733a1505cbc9b7cf5da2162cbc25aeff47a21725e26a
                                      • Instruction Fuzzy Hash: 9C21B231A00205DFDF15DB64C484AAE3BA9EB98750F10C459EC0A8B294EB31EE4ACBD1
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 79125a9ce362808fe95f5ae1188dd153174fbaa7404dfdf9002ec7384bc743c1
                                      • Instruction ID: 9cdde7ce5e6a893b6eb17a9d07e7d5d136ddbe501c788d1878822e3890cc1494
                                      • Opcode Fuzzy Hash: 79125a9ce362808fe95f5ae1188dd153174fbaa7404dfdf9002ec7384bc743c1
                                      • Instruction Fuzzy Hash: 3E2105317006118FC3269A29C8D492FBBA6FF8975175445A8E816DB790CF30DC06CBC0
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845242622.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_e7d000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5f69e6c06c80514fc62631d1a916b051c76733e03485fa7fcf6cf79f0349fb0b
                                      • Instruction ID: fec028143ec5eb79b4606a6987266158b31575cc009a66f55fa64224a559b6df
                                      • Opcode Fuzzy Hash: 5f69e6c06c80514fc62631d1a916b051c76733e03485fa7fcf6cf79f0349fb0b
                                      • Instruction Fuzzy Hash: F521D0715083449FDB14DF20CDC4B26BB76FF84318F24D5A9E84E5B282C736D846CA62
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0faea35e238ac9ea0417590da6c71d50fffaf4e5b9c001da559c6c8d402963ae
                                      • Instruction ID: e93757154771712af492a9745498863c707fc186471b207a607fd9f03d502c20
                                      • Opcode Fuzzy Hash: 0faea35e238ac9ea0417590da6c71d50fffaf4e5b9c001da559c6c8d402963ae
                                      • Instruction Fuzzy Hash: CD113631E042599FCB02DBB8EC009DEBB75FF89210F2483A6D925B7190E6322906C790
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6478ae3d9d675f67f9950d7e4ff063d8ab7afc9c3011b417c48da26612861825
                                      • Instruction ID: 2f4483862c2a70dc773569c2609a03eb780c260266bfeae7e399869c8e66f936
                                      • Opcode Fuzzy Hash: 6478ae3d9d675f67f9950d7e4ff063d8ab7afc9c3011b417c48da26612861825
                                      • Instruction Fuzzy Hash: 302124316441499FDB0A9F78E494B6B7FB6EB48314F2044A4FA558B281CF34CC51CBE0
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 138e586a16f90e2b2924420d5f291f56f5603c52e01d517865ea39b2c4449dfd
                                      • Instruction ID: fc2b05d6c9685b0fc92355fd95ffdc532298c437e53219f55ca2bfb11eb82db6
                                      • Opcode Fuzzy Hash: 138e586a16f90e2b2924420d5f291f56f5603c52e01d517865ea39b2c4449dfd
                                      • Instruction Fuzzy Hash: 4D111971E006498FDB09CFEAD8446EEBFF2EBCA300F18D469D418A72A5DB7054468F54
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0cb4e5e77fb110c114b2abc5ad9054a6e8bc8307645935b36f27a78181f90b02
                                      • Instruction ID: c2d05a740d34a97b995ec93bb4270a0abbc6caeb3953eac726596579c487e97c
                                      • Opcode Fuzzy Hash: 0cb4e5e77fb110c114b2abc5ad9054a6e8bc8307645935b36f27a78181f90b02
                                      • Instruction Fuzzy Hash: 772151B0D00209DFDB45EFB9D94079EBBF2FB49304F0085AAD058AB365EB309A55DB81
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ebc967e85d5b64387b64a40a4ec85adaa2a9da99389fb4813d22ac0176cc815f
                                      • Instruction ID: dc797670eeac0fdee056033515c6541f39f1b9cb427b14ada4007ef0a7aee107
                                      • Opcode Fuzzy Hash: ebc967e85d5b64387b64a40a4ec85adaa2a9da99389fb4813d22ac0176cc815f
                                      • Instruction Fuzzy Hash: A501D830B443449BD7151A76A85877FBAEBAFCA250B1488B7F506C32D5DD388C058375
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16b1d33d22d0d07308a0786b8ae461f316ddaa008bd7327c34bd8eb89d4b6b1f
                                      • Instruction ID: ce0db340f82548cf79497b5f34ef65708603626210091b21ad3b405ea0ce5639
                                      • Opcode Fuzzy Hash: 16b1d33d22d0d07308a0786b8ae461f316ddaa008bd7327c34bd8eb89d4b6b1f
                                      • Instruction Fuzzy Hash: A701F531B082849FD7161B75A8587BFBFAAAFCA250B0488B7E546C7392DD388C058775
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f0c921b2b1b861c5da92d912b7fff5518a5f3cf15e52f6bfeab2ced1cb88c560
                                      • Instruction ID: 8d459190fad74d2be830607d61f3d6723acf13c284529a809ef5977931057ea0
                                      • Opcode Fuzzy Hash: f0c921b2b1b861c5da92d912b7fff5518a5f3cf15e52f6bfeab2ced1cb88c560
                                      • Instruction Fuzzy Hash: 8A1151B0D00209DFDB45EFB9D94079EBBF2FB49304F0085AAD018AB365EB309A559B81
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c96798fe6e5f97b1e70cac47e071458bce304b24744181be9b1a86030c33664b
                                      • Instruction ID: 31f70fa3d354e1e90e2e1e80a6175478b637c0db042b26de6b7ba560fc4be71b
                                      • Opcode Fuzzy Hash: c96798fe6e5f97b1e70cac47e071458bce304b24744181be9b1a86030c33664b
                                      • Instruction Fuzzy Hash: CA211774D042098FCB15DFA8D4845EEBFF0FF49304F10416AD805B7264EB305A95CBA1
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845242622.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_e7d000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                      • Instruction ID: c0c0a9c6bbbc9485b03f8e9bd51558ce00d3ef60be7722aee1532ec94ca475c7
                                      • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                      • Instruction Fuzzy Hash: 70118E75508244DFCB15CF10D9C4B16BB72FB44318F28C6A9D8494B696C33AD84ACF61
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3003a4736175ce7a307b2afcd88bef69f0b390f80a851d2e6c3e1f295932320a
                                      • Instruction ID: 968568b75429c09652872403b0952872ce287294c4d7367006a9964e3d4f9581
                                      • Opcode Fuzzy Hash: 3003a4736175ce7a307b2afcd88bef69f0b390f80a851d2e6c3e1f295932320a
                                      • Instruction Fuzzy Hash: 51012872B000046FCB538EA4A850BEF3F97EBC8790F288069F505D7280CE358C128BA0
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ef08afc72b6b903c4a4e5baa07dc1efccdec3e2d888f47f6f8dda7c79fe9b28d
                                      • Instruction ID: d35cd282e4a4b347671db7872470f2ec0fb381bc381482c5ae17dfb70ed934db
                                      • Opcode Fuzzy Hash: ef08afc72b6b903c4a4e5baa07dc1efccdec3e2d888f47f6f8dda7c79fe9b28d
                                      • Instruction Fuzzy Hash: 61E02272D041859FDB0ADBBAAC086EEBB78D78B300F085468D508A31E1CB706059CB91
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 22786623e3ea3e58e263e1e602428b312e5b09acab64a25d7275e6c7b5da0d2f
                                      • Instruction ID: 82b9b5863e6f185e5805ed824623e16ce120f47f3d4aafb28b3833840dd87a54
                                      • Opcode Fuzzy Hash: 22786623e3ea3e58e263e1e602428b312e5b09acab64a25d7275e6c7b5da0d2f
                                      • Instruction Fuzzy Hash: 3AE022319042499FEB06CFAAA8082FABBB4EB8B300F009464D004620A1DBF052198A91
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e8bec350f51b0adeefe9d3d8dfe8695cdbcfa5ff7d826edef88aac304f0a1ac7
                                      • Instruction ID: 49bcb88467e339821de4f4ff95beece9fbab7cc9183636134d9ee1158ed28278
                                      • Opcode Fuzzy Hash: e8bec350f51b0adeefe9d3d8dfe8695cdbcfa5ff7d826edef88aac304f0a1ac7
                                      • Instruction Fuzzy Hash: 2CE0D835D503599BCB119AB5DC054DFBF34EDE3310B454157D1603B141EB60250A8BB1
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 02c212605b08d088d9ceb07111fb48a1cc28e6d1635c3f977984c521d59083a3
                                      • Instruction ID: 7b96d11db94e5d59ff196330590ac7d8e59d8b45a951bc942079c6451ee24b56
                                      • Opcode Fuzzy Hash: 02c212605b08d088d9ceb07111fb48a1cc28e6d1635c3f977984c521d59083a3
                                      • Instruction Fuzzy Hash: 9CE0DFA3C081868BE7168BE668960BDBF30DBD3201748A4CBC0899B1E5D664A206DB16
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 34c6536c23ce56047b77927963506b1f1bfbb80dd65db8f716d4432cfb059b5d
                                      • Instruction ID: faaa92efabb3d35a38d120434467422265c207208879d1517f4744f88350892e
                                      • Opcode Fuzzy Hash: 34c6536c23ce56047b77927963506b1f1bfbb80dd65db8f716d4432cfb059b5d
                                      • Instruction Fuzzy Hash: 24E0B33600010EBF8F429F91DA44CC97FAAAB49658B499191FA185A131D232D5A5EB50
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6af3e11d18f281fafcce46b671a7224426bbd2c014ebbdc0e4a8afea46801f7b
                                      • Instruction ID: a7925a47f84833d748cca345b0d4b124d72dd65a835aba162b19291c4699523a
                                      • Opcode Fuzzy Hash: 6af3e11d18f281fafcce46b671a7224426bbd2c014ebbdc0e4a8afea46801f7b
                                      • Instruction Fuzzy Hash: D8D01732D2022A979B10AAA9DC048EEBB38EE96621B908626D52437140EB70265986B1
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                      • Instruction ID: 6750b3bceb0d47cf3225625ca5472a14efb9ee8ce115328eb74ab5c2339f2b5c
                                      • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                      • Instruction Fuzzy Hash: 27C08C3320C1282BA636108F7C81EB3BF8CC3C53F4A2541B7F95CE3280A8429C8041F8
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fb4df2c86e5b8ecc6217ba0696bb8eaa19185519e09c2d4a5fca1607c2f99d1b
                                      • Instruction ID: f64e9c12fd643b25e877d5762b223bc0417777dfa559e636bbe4f5b4cd78345b
                                      • Opcode Fuzzy Hash: fb4df2c86e5b8ecc6217ba0696bb8eaa19185519e09c2d4a5fca1607c2f99d1b
                                      • Instruction Fuzzy Hash: 14D0677BB41008EFDB049F98E8409DDB7B6FB9C221B148516E915E3260C6319961DB54
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 66d255f040c7bbd874513911d6f29971fa815a0ceab6374a1c29986b44a9a0cc
                                      • Instruction ID: d74eb458db689595e3eede993b12c30076b70ec66471808c163c1b44aaa5b048
                                      • Opcode Fuzzy Hash: 66d255f040c7bbd874513911d6f29971fa815a0ceab6374a1c29986b44a9a0cc
                                      • Instruction Fuzzy Hash: 8DD02E709483450BC302F330EA06A6A3B29AA82208B844890E8050BA0BEE785C194BA2
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.3845893059.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2b00000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8ded2ddddf3f0632f569a5516c623aa448ba71c345844ba085af9e6f8b8d1090
                                      • Instruction ID: 8eb20f472f491b16dd0a394e3f839d7fa9ffeaea7ff47ed67dfb1bf23dd698e3
                                      • Opcode Fuzzy Hash: 8ded2ddddf3f0632f569a5516c623aa448ba71c345844ba085af9e6f8b8d1090
                                      • Instruction Fuzzy Hash: FAC0807094030947D501F771FF46D69335AF6C1204F405550F0090751AEF746D595791