Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fpIGwanLZi.exe

Overview

General Information

Sample name:fpIGwanLZi.exe
renamed because original name is a hash value
Original sample name:f22cf9dc92fc4eee3eb35b4cdb613f21fa285d5f7630d2a898e25d4c5c512e5e.exe
Analysis ID:1588644
MD5:b270344e0a2760f0faacbe25670635bc
SHA1:2677ed82fcc97bc63ddba361d4c0052058d263c5
SHA256:f22cf9dc92fc4eee3eb35b4cdb613f21fa285d5f7630d2a898e25d4c5c512e5e
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
AI detected suspicious sample
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • fpIGwanLZi.exe (PID: 7880 cmdline: "C:\Users\user\Desktop\fpIGwanLZi.exe" MD5: B270344E0A2760F0FAACBE25670635BC)
    • fpIGwanLZi.exe (PID: 7304 cmdline: "C:\Users\user\Desktop\fpIGwanLZi.exe" MD5: B270344E0A2760F0FAACBE25670635BC)
    • fpIGwanLZi.exe (PID: 7368 cmdline: "C:\Users\user\Desktop\fpIGwanLZi.exe" MD5: B270344E0A2760F0FAACBE25670635BC)
    • fpIGwanLZi.exe (PID: 7380 cmdline: "C:\Users\user\Desktop\fpIGwanLZi.exe" MD5: B270344E0A2760F0FAACBE25670635BC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "recruitment_ck@bprck.co.id", "Password": "@BPR.ck22!!", "Host": "mail.bprck.co.id", "Port": "587", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
    • 0xdc75:$a1: get_encryptedPassword
    • 0xdf50:$a2: get_encryptedUsername
    • 0xda81:$a3: get_timePasswordChanged
    • 0xdb7c:$a4: get_passwordField
    • 0xdc8b:$a5: set_encryptedPassword
    • 0xf26a:$a7: get_logins
    • 0xf1cd:$a10: KeyLoggerEventArgs
    • 0xee5c:$a11: KeyLoggerEventArgsEventHandler
    00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
    • 0x11428:$x1: $%SMTPDV$
    • 0x1148e:$x2: $#TheHashHere%&
    • 0x12ac5:$x3: %FTPDV$
    • 0x12baf:$x4: $%TelegramDv$
    • 0xee5c:$x5: KeyLoggerEventArgs
    • 0xf1cd:$x5: KeyLoggerEventArgs
    • 0x12ae9:$m2: Clipboard Logs ID
    • 0x12cff:$m2: Screenshot Logs ID
    • 0x12e0f:$m2: keystroke Logs ID
    • 0x130e9:$m3: SnakePW
    • 0x12cd7:$m4: \SnakeKeylogger\
    00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x4acad:$a1: get_encryptedPassword
      • 0x616cd:$a1: get_encryptedPassword
      • 0x77eed:$a1: get_encryptedPassword
      • 0x4af88:$a2: get_encryptedUsername
      • 0x619a8:$a2: get_encryptedUsername
      • 0x781c8:$a2: get_encryptedUsername
      • 0x4aab9:$a3: get_timePasswordChanged
      • 0x614d9:$a3: get_timePasswordChanged
      • 0x77cf9:$a3: get_timePasswordChanged
      • 0x4abb4:$a4: get_passwordField
      • 0x615d4:$a4: get_passwordField
      • 0x77df4:$a4: get_passwordField
      • 0x4acc3:$a5: set_encryptedPassword
      • 0x616e3:$a5: set_encryptedPassword
      • 0x77f03:$a5: set_encryptedPassword
      • 0x4c2a2:$a7: get_logins
      • 0x62cc2:$a7: get_logins
      • 0x794e2:$a7: get_logins
      • 0x4c205:$a10: KeyLoggerEventArgs
      • 0x62c25:$a10: KeyLoggerEventArgs
      • 0x79445:$a10: KeyLoggerEventArgs
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      0.2.fpIGwanLZi.exe.3eb5e38.3.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        0.2.fpIGwanLZi.exe.3eb5e38.3.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xc075:$a1: get_encryptedPassword
        • 0xc350:$a2: get_encryptedUsername
        • 0xbe81:$a3: get_timePasswordChanged
        • 0xbf7c:$a4: get_passwordField
        • 0xc08b:$a5: set_encryptedPassword
        • 0xd66a:$a7: get_logins
        • 0xd5cd:$a10: KeyLoggerEventArgs
        • 0xd25c:$a11: KeyLoggerEventArgsEventHandler
        0.2.fpIGwanLZi.exe.3eb5e38.3.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
        • 0xcc0b:$s1: UnHook
        • 0xcc12:$s2: SetHook
        • 0xcc1a:$s3: CallNextHook
        • 0xcc27:$s4: _hook
        0.2.fpIGwanLZi.exe.3eb5e38.3.unpackMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0xf828:$x1: $%SMTPDV$
        • 0xf88e:$x2: $#TheHashHere%&
        • 0x10ec5:$x3: %FTPDV$
        • 0x10faf:$x4: $%TelegramDv$
        • 0xd25c:$x5: KeyLoggerEventArgs
        • 0xd5cd:$x5: KeyLoggerEventArgs
        • 0x10ee9:$m2: Clipboard Logs ID
        • 0x110ff:$m2: Screenshot Logs ID
        • 0x1120f:$m2: keystroke Logs ID
        • 0x114e9:$m3: SnakePW
        • 0x110d7:$m4: \SnakeKeylogger\
        0.2.fpIGwanLZi.exe.3ecc858.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 15 entries
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-11T03:45:18.578097+010028033053Unknown Traffic192.168.2.1049930104.21.48.1443TCP
          2025-01-11T03:45:19.730053+010028033053Unknown Traffic192.168.2.1049940104.21.48.1443TCP
          2025-01-11T03:45:21.637494+010028033053Unknown Traffic192.168.2.1049951104.21.48.1443TCP
          2025-01-11T03:45:22.581243+010028033053Unknown Traffic192.168.2.1049959104.21.48.1443TCP
          2025-01-11T03:45:23.480331+010028033053Unknown Traffic192.168.2.1049966104.21.48.1443TCP
          2025-01-11T03:45:24.351225+010028033053Unknown Traffic192.168.2.1049973104.21.48.1443TCP
          2025-01-11T03:45:25.455761+010028033053Unknown Traffic192.168.2.1049980104.21.48.1443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-11T03:45:16.600341+010028032742Potentially Bad Traffic192.168.2.1049814132.226.8.16980TCP
          2025-01-11T03:45:18.037828+010028032742Potentially Bad Traffic192.168.2.1049814132.226.8.16980TCP
          2025-01-11T03:45:19.178475+010028032742Potentially Bad Traffic192.168.2.1049814132.226.8.16980TCP
          2025-01-11T03:45:21.069145+010028032742Potentially Bad Traffic192.168.2.1049814132.226.8.16980TCP
          2025-01-11T03:45:22.022321+010028032742Potentially Bad Traffic192.168.2.1049814132.226.8.16980TCP
          2025-01-11T03:45:22.928496+010028032742Potentially Bad Traffic192.168.2.1049814132.226.8.16980TCP
          2025-01-11T03:45:23.819200+010028032742Potentially Bad Traffic192.168.2.1049814132.226.8.16980TCP
          2025-01-11T03:45:24.850359+010028032742Potentially Bad Traffic192.168.2.1049814132.226.8.16980TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "recruitment_ck@bprck.co.id", "Password": "@BPR.ck22!!", "Host": "mail.bprck.co.id", "Port": "587", "Version": "5.1"}
          Source: fpIGwanLZi.exeReversingLabs: Detection: 63%
          Source: fpIGwanLZi.exeVirustotal: Detection: 79%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: fpIGwanLZi.exeJoe Sandbox ML: detected

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: fpIGwanLZi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.10:49922 version: TLS 1.0
          Source: fpIGwanLZi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: hEdIE.pdb source: fpIGwanLZi.exe
          Source: Binary string: hEdIE.pdbSHA256K source: fpIGwanLZi.exe
          Source: global trafficTCP traffic: 192.168.2.10:51628 -> 162.159.36.2:53
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
          Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49814 -> 132.226.8.169:80
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49930 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49940 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49973 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49951 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49959 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49980 -> 104.21.48.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.10:49966 -> 104.21.48.1:443
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.10:49922 version: TLS 1.0
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003285000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003279000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000333A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003285000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003345000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003323000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003318000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000332E000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: fpIGwanLZi.exe, 00000005.00000002.3165103758.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: fpIGwanLZi.exe, 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
          Source: fpIGwanLZi.exe, 00000005.00000002.3165103758.00000000032A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
          Source: fpIGwanLZi.exe, 00000005.00000002.3165103758.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000333A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003285000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003345000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003323000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003318000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000332E000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: fpIGwanLZi.exe, 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003285000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000333A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003345000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003323000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003318000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000332E000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49951
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
          Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49951 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
          Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49959 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49959
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49966

          System Summary

          barindex
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 5.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 5.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 5.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7880, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7880, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7380, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7380, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_0148D5840_2_0148D584
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_054EE62B0_2_054EE62B
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_054EE6300_2_054EE630
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_0713B7600_2_0713B760
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_0713B3280_2_0713B328
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_0713CFA00_2_0713CFA0
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_0713AEBF0_2_0713AEBF
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_0713AEF00_2_0713AEF0
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_0713CB680_2_0713CB68
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_071416500_2_07141650
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F9C1905_2_02F9C190
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F961185_2_02F96118
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F9C7535_2_02F9C753
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F9B4A05_2_02F9B4A0
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F9C4705_2_02F9C470
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F935805_2_02F93580
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F94AD95_2_02F94AD9
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F9CA335_2_02F9CA33
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F9BBD35_2_02F9BBD3
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F998585_2_02F99858
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F9BEB05_2_02F9BEB0
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_02F9B4F35_2_02F9B4F3
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_06C4C2545_2_06C4C254
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_06C4F55B5_2_06C4F55B
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_06C4F5605_2_06C4F560
          Source: fpIGwanLZi.exe, 00000000.00000002.1466425489.0000000007A63000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamempclient.dllj% vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1461013073.0000000002E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1465837006.0000000005A90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1463069626.0000000003F1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1461013073.0000000002E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000000.1294241275.0000000000AFC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamehEdIE.exe< vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1466171931.0000000007480000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000000.00000002.1459472130.000000000109E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exe, 00000005.00000002.3163959687.0000000001337000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exeBinary or memory string: OriginalFilenamehEdIE.exe< vs fpIGwanLZi.exe
          Source: fpIGwanLZi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 5.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 5.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 5.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.fpIGwanLZi.exe.3eb5e38.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.fpIGwanLZi.exe.3ecc858.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7880, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7880, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7380, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: fpIGwanLZi.exe PID: 7380, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: fpIGwanLZi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal96.troj.evad.winEXE@7/1@2/2
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fpIGwanLZi.exe.logJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMutant created: NULL
          Source: fpIGwanLZi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: fpIGwanLZi.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: fpIGwanLZi.exeReversingLabs: Detection: 63%
          Source: fpIGwanLZi.exeVirustotal: Detection: 79%
          Source: unknownProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: fpIGwanLZi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: fpIGwanLZi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: fpIGwanLZi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: hEdIE.pdb source: fpIGwanLZi.exe
          Source: Binary string: hEdIE.pdbSHA256K source: fpIGwanLZi.exe
          Source: fpIGwanLZi.exeStatic PE information: 0x9A1BCFA6 [Wed Dec 6 22:18:14 2051 UTC]
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_054E4C35 pushfd ; retf 0_2_054E4C41
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_054EB1AF push eax; mov dword ptr [esp], edx0_2_054EB1C4
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_054EF1A0 push eax; retf 0_2_054EF1A1
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 0_2_054EDCA0 push esp; ret 0_2_054EDCA1
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_06C4B6A0 push ss; retf 5_2_06C4B8AA
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_06C4B5E9 push cs; retf 5_2_06C4B5EA
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_06C4B8A1 push ss; retf 5_2_06C4B8A2
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeCode function: 5_2_06C4B988 push ss; retf 5_2_06C4B992
          Source: fpIGwanLZi.exeStatic PE information: section name: .text entropy: 6.958210174643718
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: fpIGwanLZi.exe PID: 7880, type: MEMORYSTR
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 1480000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 4E70000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 95D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: A5D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: A7F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: B7F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 7900Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 1384Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exe TID: 1384Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeThread delayed: delay time: 600000Jump to behavior
          Source: fpIGwanLZi.exe, 00000005.00000002.3164463248.0000000001496000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllT
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeMemory written: C:\Users\user\Desktop\fpIGwanLZi.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeProcess created: C:\Users\user\Desktop\fpIGwanLZi.exe "C:\Users\user\Desktop\fpIGwanLZi.exe"Jump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Users\user\Desktop\fpIGwanLZi.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Users\user\Desktop\fpIGwanLZi.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\fpIGwanLZi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3eb5e38.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3ecc858.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3eb5e38.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3ecc858.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.3165103758.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: fpIGwanLZi.exe PID: 7880, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: fpIGwanLZi.exe PID: 7380, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3eb5e38.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3ecc858.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.fpIGwanLZi.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3eb5e38.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.fpIGwanLZi.exe.3ecc858.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.3165103758.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: fpIGwanLZi.exe PID: 7880, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: fpIGwanLZi.exe PID: 7380, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          111
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable Media1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
          Process Injection
          NTDS1
          System Network Configuration Discovery
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Obfuscated Files or Information
          LSA Secrets12
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
          Software Packing
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Timestomp
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          fpIGwanLZi.exe63%ReversingLabsWin32.Trojan.Jalapeno
          fpIGwanLZi.exe79%VirustotalBrowse
          fpIGwanLZi.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          reallyfreegeoip.org
          104.21.48.1
          truefalse
            high
            checkip.dyndns.com
            132.226.8.169
            truefalse
              high
              checkip.dyndns.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/false
                  high
                  https://reallyfreegeoip.org/xml/8.46.123.189false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgfpIGwanLZi.exe, 00000005.00000002.3165103758.000000000333A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003285000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003345000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003323000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003318000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000332E000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://checkip.dyndns.orgfpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003279000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000333A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003285000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003345000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003323000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003318000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000332E000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.comfpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003285000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefpIGwanLZi.exe, 00000005.00000002.3165103758.00000000031C1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.org/qfpIGwanLZi.exe, 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              https://reallyfreegeoip.org/xml/8.46.123.189$fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000333A000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003345000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003323000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003318000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.000000000332E000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgfpIGwanLZi.exe, 00000005.00000002.3165103758.00000000032A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/fpIGwanLZi.exe, 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3165103758.0000000003285000.00000004.00000800.00020000.00000000.sdmp, fpIGwanLZi.exe, 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    132.226.8.169
                                    checkip.dyndns.comUnited States
                                    16989UTMEMUSfalse
                                    104.21.48.1
                                    reallyfreegeoip.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1588644
                                    Start date and time:2025-01-11 03:43:49 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 30s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Run name:Run with higher sleep bypass
                                    Number of analysed new started processes analysed:10
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:fpIGwanLZi.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:f22cf9dc92fc4eee3eb35b4cdb613f21fa285d5f7630d2a898e25d4c5c512e5e.exe
                                    Detection:MAL
                                    Classification:mal96.troj.evad.winEXE@7/1@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 111
                                    • Number of non-executed functions: 10
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 13.107.246.45, 2.23.242.162, 172.202.163.200
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    132.226.8.1694NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    H75MnQEha8.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    7b4Iaf58Rp.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • checkip.dyndns.org/
                                    b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    UF7jzc7ETP.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    104.21.48.1NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                    • www.axis138ae.shop/j2vs/
                                    SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                    • twirpx.org/administrator/index.php
                                    SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                    • www.antipromil.site/7ykh/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    reallyfreegeoip.org4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.80.1
                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.80.1
                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 104.21.16.1
                                    rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.80.1
                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.112.1
                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.16.1
                                    uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.64.1
                                    6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.80.1
                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.32.1
                                    checkip.dyndns.com4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 132.226.8.169
                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 158.101.44.242
                                    rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.6.168
                                    uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 132.226.8.169
                                    6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.6.168
                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 132.226.247.73
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CLOUDFLARENETUSAJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                                    • 188.114.97.3
                                    1SxKeB4u0c.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.95.160
                                    SpCuEoekPa.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.64.1
                                    AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                                    • 188.114.96.3
                                    suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
                                    • 188.114.97.3
                                    4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.80.1
                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.80.1
                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 104.21.16.1
                                    AxKxwW9WGa.exeGet hashmaliciousFormBookBrowse
                                    • 172.67.186.192
                                    UTMEMUS4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 132.226.8.169
                                    uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 132.226.8.169
                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 132.226.247.73
                                    TjoY7n65om.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 132.226.247.73
                                    Kb94RzMYNf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 132.226.247.73
                                    H75MnQEha8.exeGet hashmaliciousMassLogger RATBrowse
                                    • 132.226.8.169
                                    z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                    • 132.226.247.73
                                    Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 132.226.247.73
                                    6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 132.226.247.73
                                    7b4Iaf58Rp.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 132.226.8.169
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    54328bd36c14bd82ddaa0c04b25ed9ad4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.48.1
                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 104.21.48.1
                                    rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.48.1
                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.48.1
                                    6BRa130JDj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.48.1
                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 104.21.48.1
                                    No context
                                    Process:C:\Users\user\Desktop\fpIGwanLZi.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.34331486778365
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):6.950802950730529
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:fpIGwanLZi.exe
                                    File size:757'760 bytes
                                    MD5:b270344e0a2760f0faacbe25670635bc
                                    SHA1:2677ed82fcc97bc63ddba361d4c0052058d263c5
                                    SHA256:f22cf9dc92fc4eee3eb35b4cdb613f21fa285d5f7630d2a898e25d4c5c512e5e
                                    SHA512:9cb8c9e211e28b9d989993fce4b93429c24f1db7a57c54a594888489568b4f42dee6c8fbadf189978d117e76bf6a85f710484892ecfb3d55ab6cffdde81cf59d
                                    SSDEEP:12288:npZsS4aTEaFP2BHykEW+7CGpfxNuWro8wFiQ4Cg0:nzsHaTEw7Jl7FpruWro8wF9g
                                    TLSH:A1F4933D29BD222BA175C3A7CBDBF427F138986F3115AD6498D343A94346A4734C326E
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............f.... ........@.. ....................................@................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x4ba566
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x9A1BCFA6 [Wed Dec 6 22:18:14 2051 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xba5110x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x5ac.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xbe0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb8c080x70.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xb856c0xb860082e60ee3e19305397cc2f5935f919b74False0.7003138241525424data6.958210174643718IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xbc0000x5ac0x6001fefeea52d892dd9bb08ebb0534bae89False0.4231770833333333data4.111005504871255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xbe0000xc0x200c09020cb67e1caded6bd0125e1440504False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0xbc0900x31cdata0.4396984924623116
                                    RT_MANIFEST0xbc3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-11T03:45:16.600341+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049814132.226.8.16980TCP
                                    2025-01-11T03:45:18.037828+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049814132.226.8.16980TCP
                                    2025-01-11T03:45:18.578097+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1049930104.21.48.1443TCP
                                    2025-01-11T03:45:19.178475+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049814132.226.8.16980TCP
                                    2025-01-11T03:45:19.730053+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1049940104.21.48.1443TCP
                                    2025-01-11T03:45:21.069145+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049814132.226.8.16980TCP
                                    2025-01-11T03:45:21.637494+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1049951104.21.48.1443TCP
                                    2025-01-11T03:45:22.022321+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049814132.226.8.16980TCP
                                    2025-01-11T03:45:22.581243+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1049959104.21.48.1443TCP
                                    2025-01-11T03:45:22.928496+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049814132.226.8.16980TCP
                                    2025-01-11T03:45:23.480331+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1049966104.21.48.1443TCP
                                    2025-01-11T03:45:23.819200+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049814132.226.8.16980TCP
                                    2025-01-11T03:45:24.351225+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1049973104.21.48.1443TCP
                                    2025-01-11T03:45:24.850359+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049814132.226.8.16980TCP
                                    2025-01-11T03:45:25.455761+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1049980104.21.48.1443TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 11, 2025 03:45:00.328758001 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:00.334496975 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:00.334573984 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:00.335177898 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:00.340950012 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:14.124535084 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:14.130105019 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:14.134972095 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:16.555829048 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:16.600341082 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:16.635885954 CET49922443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:16.635948896 CET44349922104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:16.636024952 CET49922443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:16.644435883 CET49922443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:16.644467115 CET44349922104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:17.109497070 CET44349922104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:17.109587908 CET49922443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:17.130731106 CET49922443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:17.130754948 CET44349922104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:17.131645918 CET44349922104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:17.178469896 CET49922443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:17.222918987 CET49922443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:17.263323069 CET44349922104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:17.333410025 CET44349922104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:17.333472013 CET44349922104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:17.333548069 CET49922443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:17.367422104 CET49922443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:17.371121883 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:17.375941992 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:17.982935905 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:17.985934019 CET49930443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:17.985975027 CET44349930104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:17.986562967 CET49930443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:17.986890078 CET49930443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:17.986902952 CET44349930104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:18.037827969 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:18.447875977 CET44349930104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:18.468338013 CET49930443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:18.468369961 CET44349930104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:18.578110933 CET44349930104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:18.578207016 CET44349930104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:18.578315973 CET49930443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:18.607923985 CET49930443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:18.657394886 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:18.662219048 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:19.138087034 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:19.139105082 CET49940443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:19.139137983 CET44349940104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:19.139209986 CET49940443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:19.139719963 CET49940443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:19.139729977 CET44349940104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:19.178474903 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:19.598900080 CET44349940104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:19.603485107 CET49940443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:19.603498936 CET44349940104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:19.730130911 CET44349940104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:19.730268002 CET44349940104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:19.730351925 CET49940443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:19.730978966 CET49940443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:19.734113932 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:19.738920927 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:21.020294905 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:21.021179914 CET49951443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:21.021223068 CET44349951104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:21.021297932 CET49951443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:21.021564007 CET49951443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:21.021579027 CET44349951104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:21.069144964 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:21.486943007 CET44349951104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:21.512759924 CET49951443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:21.512795925 CET44349951104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:21.637533903 CET44349951104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:21.637620926 CET44349951104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:21.637687922 CET49951443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:21.669789076 CET49951443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:21.673613071 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:21.680749893 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:21.968872070 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:21.969794035 CET49959443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:21.969836950 CET44349959104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:21.969898939 CET49959443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:21.970347881 CET49959443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:21.970364094 CET44349959104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:22.022320986 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:22.427922964 CET44349959104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:22.430691004 CET49959443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:22.430727005 CET44349959104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:22.581273079 CET44349959104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:22.581361055 CET44349959104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:22.581465960 CET49959443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:22.582096100 CET49959443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:22.585417986 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:22.590224028 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:22.886873007 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:22.887820005 CET49966443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:22.887856007 CET44349966104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:22.887922049 CET49966443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:22.888245106 CET49966443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:22.888253927 CET44349966104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:22.928495884 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:23.354043961 CET44349966104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:23.360631943 CET49966443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:23.360667944 CET44349966104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:23.480407000 CET44349966104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:23.480577946 CET44349966104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:23.480638981 CET49966443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:23.481156111 CET49966443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:23.484424114 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:23.489207983 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:23.775898933 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:23.777159929 CET49973443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:23.777220011 CET44349973104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:23.777318001 CET49973443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:23.777744055 CET49973443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:23.777756929 CET44349973104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:23.819200039 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:24.230093002 CET44349973104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:24.234369040 CET49973443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:24.234394073 CET44349973104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:24.351273060 CET44349973104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:24.351361990 CET44349973104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:24.351413012 CET49973443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:24.359349012 CET49973443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:24.443308115 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:24.448399067 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:24.802040100 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:45:24.803785086 CET49980443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:24.803838968 CET44349980104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:24.803915977 CET49980443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:24.804250956 CET49980443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:24.804265022 CET44349980104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:24.850358963 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:45:25.310972929 CET44349980104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:25.312750101 CET49980443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:25.312766075 CET44349980104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:25.455784082 CET44349980104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:25.455867052 CET44349980104.21.48.1192.168.2.10
                                    Jan 11, 2025 03:45:25.456000090 CET49980443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:25.456593037 CET49980443192.168.2.10104.21.48.1
                                    Jan 11, 2025 03:45:28.076992989 CET5162853192.168.2.10162.159.36.2
                                    Jan 11, 2025 03:45:28.081876040 CET5351628162.159.36.2192.168.2.10
                                    Jan 11, 2025 03:45:28.081999063 CET5162853192.168.2.10162.159.36.2
                                    Jan 11, 2025 03:45:28.087011099 CET5351628162.159.36.2192.168.2.10
                                    Jan 11, 2025 03:45:28.530359983 CET5162853192.168.2.10162.159.36.2
                                    Jan 11, 2025 03:45:28.535526991 CET5351628162.159.36.2192.168.2.10
                                    Jan 11, 2025 03:45:28.535595894 CET5162853192.168.2.10162.159.36.2
                                    Jan 11, 2025 03:46:29.795870066 CET8049814132.226.8.169192.168.2.10
                                    Jan 11, 2025 03:46:29.795984983 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:47:04.788652897 CET4981480192.168.2.10132.226.8.169
                                    Jan 11, 2025 03:47:04.793488979 CET8049814132.226.8.169192.168.2.10
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 11, 2025 03:45:00.242506027 CET6347753192.168.2.101.1.1.1
                                    Jan 11, 2025 03:45:00.249583960 CET53634771.1.1.1192.168.2.10
                                    Jan 11, 2025 03:45:16.627712965 CET5490053192.168.2.101.1.1.1
                                    Jan 11, 2025 03:45:16.634907007 CET53549001.1.1.1192.168.2.10
                                    Jan 11, 2025 03:45:28.076117992 CET5357429162.159.36.2192.168.2.10
                                    Jan 11, 2025 03:45:28.614306927 CET53648661.1.1.1192.168.2.10
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 11, 2025 03:45:00.242506027 CET192.168.2.101.1.1.10xa424Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:16.627712965 CET192.168.2.101.1.1.10x3e8bStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 11, 2025 03:45:00.249583960 CET1.1.1.1192.168.2.100xa424No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                    Jan 11, 2025 03:45:00.249583960 CET1.1.1.1192.168.2.100xa424No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:00.249583960 CET1.1.1.1192.168.2.100xa424No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:00.249583960 CET1.1.1.1192.168.2.100xa424No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:00.249583960 CET1.1.1.1192.168.2.100xa424No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:00.249583960 CET1.1.1.1192.168.2.100xa424No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:16.634907007 CET1.1.1.1192.168.2.100x3e8bNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:16.634907007 CET1.1.1.1192.168.2.100x3e8bNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:16.634907007 CET1.1.1.1192.168.2.100x3e8bNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:16.634907007 CET1.1.1.1192.168.2.100x3e8bNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:16.634907007 CET1.1.1.1192.168.2.100x3e8bNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:16.634907007 CET1.1.1.1192.168.2.100x3e8bNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                    Jan 11, 2025 03:45:16.634907007 CET1.1.1.1192.168.2.100x3e8bNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                    • reallyfreegeoip.org
                                    • checkip.dyndns.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.1049814132.226.8.169807380C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 11, 2025 03:45:00.335177898 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 11, 2025 03:45:14.124535084 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:13 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:45:14.130105019 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:45:16.555829048 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:16 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:45:17.371121883 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:45:17.982935905 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:17 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:45:18.657394886 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:45:19.138087034 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:19 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:45:19.734113932 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:45:21.020294905 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:20 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:45:21.673613071 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:45:21.968872070 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:21 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:45:22.585417986 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:45:22.886873007 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:22 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:45:23.484424114 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:45:23.775898933 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:23 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 11, 2025 03:45:24.443308115 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 11, 2025 03:45:24.802040100 CET273INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:24 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.1049922104.21.48.14437380C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:45:17 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-11 02:45:17 UTC855INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:17 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1878306
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JDa06YV9z0yrUvMmKiOBD9AWheuM%2F3Cm4Yxa7BCnV5%2BjI4bx5Hq22a6LXAijhaFlesGOAHCVpDLs5wHEOhAPPSSr5IWM3fwmXXrepXUxYDS9vjgVXqWa0FBrDbnylE%2BN93QBTDoq"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900191def99d8c15-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1799&min_rtt=1788&rtt_var=692&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1556503&cwnd=238&unsent_bytes=0&cid=226024f84bd99f23&ts=241&x=0"
                                    2025-01-11 02:45:17 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.1049930104.21.48.14437380C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:45:18 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:45:18 UTC863INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:18 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1878307
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2B4FvgB8dVGieWTNHJfSK0l5gYrqn7PYldw6%2FGojgWY33XNYaqxrlCFTozRB9QLpQYzj%2BB5S3vE%2B%2BeFMWn2MojlqgMCr%2FySCyhQoye%2BYH3iac5uwdacjyCN1NL5YLxfFoBtXnX27p"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900191e6b851c323-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1471&min_rtt=1470&rtt_var=554&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1967654&cwnd=214&unsent_bytes=0&cid=2ac730b96dc8e5c9&ts=140&x=0"
                                    2025-01-11 02:45:18 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.1049940104.21.48.14437380C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:45:19 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:45:19 UTC857INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:19 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1878308
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AOkNHCvKlaftsTzsATyXWavf5YRwoiR0CvCpe3rwquUyYKV0Uc6jqdNylfGcT%2FeDE5x4PLxbDgIxNR9w9lKrA36L%2FShhK%2B7lrLzUiERK4iq%2FgVolp8joqDf3O5SEDZ5k0S169ZDV"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900191edeacd42e9-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=2308&min_rtt=1739&rtt_var=1790&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=464081&cwnd=240&unsent_bytes=0&cid=9185bcd8f68e5b14&ts=140&x=0"
                                    2025-01-11 02:45:19 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.1049951104.21.48.14437380C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:45:21 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:45:21 UTC865INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:21 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1878310
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8mCNm%2BeUzRh6zty4KEj4xpDm6Wg1RZWV%2F%2F3gMrM4NRNtsoS0LxGsEfHIYF6zKzsinshv%2FZcX08z%2B0dLqa38ZiVuCFYskSAinx95d%2B7%2B4jld%2Bz0TxB9nBO8ouHWZQQNSoZHzyWvBM"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900191f9dee142e9-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1664&min_rtt=1656&rtt_var=637&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1695702&cwnd=240&unsent_bytes=0&cid=cffd28cf8fd30a83&ts=156&x=0"
                                    2025-01-11 02:45:21 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.1049959104.21.48.14437380C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:45:22 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:45:22 UTC859INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:22 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1878311
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Owjs0j8ownQAd6785Yz6%2BB%2FO8rwK9ZpZt0D30OpQtg%2F0RTJThvxWPkD%2BneIGjyoHauE3jBPURTizmKggz%2BvIL9VNNMyvcZNjaNSaaivcuHGWGXSgolfwMjCRE4l1yBkqqb7uRPR5"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900191ffb91043be-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1641&min_rtt=1633&rtt_var=618&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1788120&cwnd=226&unsent_bytes=0&cid=54643d5525d59fe6&ts=160&x=0"
                                    2025-01-11 02:45:22 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.1049966104.21.48.14437380C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:45:23 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:45:23 UTC857INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:23 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1878312
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AhvjF1vub5tERSmXGXVCn75%2BN3iRESrzkdlYzic2P9a5SytrXMv9xZ7YaDjvRCVv4CGs3TuCuMuSAFbl396sUqhFebYifE%2BA7VVlgMbx8Zo9khPpy%2F9ABRsQTOEGDEVq2N9CG%2B2i"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 900192056c9f8c15-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1793&min_rtt=1790&rtt_var=678&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1605277&cwnd=238&unsent_bytes=0&cid=882e0bf835a1636c&ts=130&x=0"
                                    2025-01-11 02:45:23 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.1049973104.21.48.14437380C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:45:24 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:45:24 UTC857INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:24 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1878313
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dAfzL4Hwk2I2VZ9q6pKhz4rhvAlJnhnKYsQQ%2BEoa35pFvA52xj0rNaOroLVJcFx9lT02%2FUL9CpZ5Pzo16A7IgHoS4NZ5G6gSRS%2BCEOZ1qvAV%2FyY034zSbzIm9WImjo8wuifxwEf0"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 9001920adec443be-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1598&min_rtt=1585&rtt_var=603&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1842271&cwnd=226&unsent_bytes=0&cid=f20a2d4671346f3e&ts=124&x=0"
                                    2025-01-11 02:45:24 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    7192.168.2.1049980104.21.48.14437380C:\Users\user\Desktop\fpIGwanLZi.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 02:45:25 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-11 02:45:25 UTC868INHTTP/1.1 200 OK
                                    Date: Sat, 11 Jan 2025 02:45:25 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1878314
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nCs5bHIbgFtG8FQzBTqY1kcfTNi0%2BXO6%2Bv3JgYSo94usBIdqhqO00m4cqT86RysBHoOGJbMGT3S%2F27hF5n5NgB%2BYmOc0HY%2B1aU70qAGn1bsb%2B%2B3WgpFAp4CZ3WVAxABtatryR99%2B"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 90019211b84843be-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=31122&min_rtt=1631&rtt_var=18168&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1790312&cwnd=226&unsent_bytes=0&cid=e0569307e298e165&ts=149&x=0"
                                    2025-01-11 02:45:25 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:21:44:42
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Desktop\fpIGwanLZi.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\fpIGwanLZi.exe"
                                    Imagebase:0xa40000
                                    File size:757'760 bytes
                                    MD5 hash:B270344E0A2760F0FAACBE25670635BC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1463069626.0000000003E79000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:21:44:57
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Desktop\fpIGwanLZi.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\fpIGwanLZi.exe"
                                    Imagebase:0x3c0000
                                    File size:757'760 bytes
                                    MD5 hash:B270344E0A2760F0FAACBE25670635BC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:4
                                    Start time:21:44:57
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Desktop\fpIGwanLZi.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\fpIGwanLZi.exe"
                                    Imagebase:0x80000
                                    File size:757'760 bytes
                                    MD5 hash:B270344E0A2760F0FAACBE25670635BC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:5
                                    Start time:21:44:57
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Desktop\fpIGwanLZi.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\fpIGwanLZi.exe"
                                    Imagebase:0xec0000
                                    File size:757'760 bytes
                                    MD5 hash:B270344E0A2760F0FAACBE25670635BC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000002.3163834939.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.3165103758.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:9.6%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:105
                                      Total number of Limit Nodes:8
                                      execution_graph 51673 148d5c8 51674 148d60e GetCurrentProcess 51673->51674 51676 148d659 51674->51676 51677 148d660 GetCurrentThread 51674->51677 51676->51677 51678 148d69d GetCurrentProcess 51677->51678 51679 148d696 51677->51679 51680 148d6d3 51678->51680 51679->51678 51681 148d6fb GetCurrentThreadId 51680->51681 51682 148d72c 51681->51682 51691 1484668 51692 148467a 51691->51692 51695 1484686 51692->51695 51697 1484779 51692->51697 51694 14846a5 51702 1483e1c 51695->51702 51698 148477c 51697->51698 51706 1484878 51698->51706 51710 1484888 51698->51710 51703 1483e27 51702->51703 51705 148707e 51703->51705 51718 1485c5c 51703->51718 51705->51694 51708 148487c 51706->51708 51707 148498c 51707->51707 51708->51707 51714 148449c 51708->51714 51712 148488a 51710->51712 51711 148498c 51711->51711 51712->51711 51713 148449c CreateActCtxA 51712->51713 51713->51711 51715 1485918 CreateActCtxA 51714->51715 51717 14859db 51715->51717 51719 1485c61 51718->51719 51722 1485c7c 51719->51722 51721 1487275 51721->51705 51723 1485c87 51722->51723 51726 1485cac 51723->51726 51725 148735a 51725->51721 51727 1485cb7 51726->51727 51730 1485cdc 51727->51730 51729 148744d 51729->51725 51731 1485ce7 51730->51731 51733 148874b 51731->51733 51736 148adf8 51731->51736 51732 1488789 51732->51729 51733->51732 51741 148cee9 51733->51741 51737 148adfc 51736->51737 51746 148ae1f 51737->51746 51750 148ae30 51737->51750 51738 148ae0e 51738->51733 51742 148ceec 51741->51742 51743 148cf3d 51742->51743 51758 148d0a8 51742->51758 51762 148d097 51742->51762 51743->51732 51747 148ae24 51746->51747 51753 148af19 51747->51753 51748 148ae3f 51748->51738 51752 148af19 GetModuleHandleW 51750->51752 51751 148ae3f 51751->51738 51752->51751 51754 148af39 51753->51754 51755 148af5c 51753->51755 51754->51755 51756 148b160 GetModuleHandleW 51754->51756 51755->51748 51757 148b18d 51756->51757 51757->51748 51759 148d0b5 51758->51759 51760 148d0ef 51759->51760 51766 148bc80 51759->51766 51760->51743 51763 148d0b5 51762->51763 51764 148d0ef 51763->51764 51765 148bc80 GetModuleHandleW 51763->51765 51764->51743 51765->51764 51767 148bc85 51766->51767 51769 148de08 51767->51769 51770 148d2a4 51767->51770 51769->51769 51771 148d2af 51770->51771 51772 1485cdc GetModuleHandleW 51771->51772 51773 148de77 51772->51773 51773->51769 51783 713e0a0 51784 713e129 CreateProcessA 51783->51784 51786 713e2eb 51784->51786 51795 148d810 51796 148d812 DuplicateHandle 51795->51796 51798 148d8a6 51796->51798 51787 7115d58 51788 7115da6 DrawTextExW 51787->51788 51790 7115dfe 51788->51790 51683 713de18 51684 713de60 WriteProcessMemory 51683->51684 51686 713deb7 51684->51686 51687 713df08 51688 713df53 ReadProcessMemory 51687->51688 51690 713df97 51688->51690 51791 713dd58 51792 713dd98 VirtualAllocEx 51791->51792 51794 713ddd5 51792->51794 51799 713d7c8 51800 713d808 ResumeThread 51799->51800 51802 713d839 51800->51802 51803 713d878 51804 713d8bd Wow64SetThreadContext 51803->51804 51806 713d905 51804->51806 51774 71401b8 51775 7140343 51774->51775 51776 71401de 51774->51776 51776->51775 51779 7140430 PostMessageW 51776->51779 51781 7140438 PostMessageW 51776->51781 51780 71404a4 51779->51780 51780->51776 51782 71404a4 51781->51782 51782->51776 51807 54e3eb0 CloseHandle 51808 54e3f17 51807->51808

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 0148D646
                                      • GetCurrentThread.KERNEL32 ref: 0148D683
                                      • GetCurrentProcess.KERNEL32 ref: 0148D6C0
                                      • GetCurrentThreadId.KERNEL32 ref: 0148D719
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: d65e638a11f4ebf25df0ebd413e253894dee258c64ece061f869c37166e99f10
                                      • Instruction ID: 95990b956f441bdff6d45e712ce269022c3ac92aacebefbd736315356e4cd10f
                                      • Opcode Fuzzy Hash: d65e638a11f4ebf25df0ebd413e253894dee258c64ece061f869c37166e99f10
                                      • Instruction Fuzzy Hash: A15176B0D013498FEB14DFAAD548BAEBBF1EF88304F20846AD019A73A0D7745981CB65

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 0148D646
                                      • GetCurrentThread.KERNEL32 ref: 0148D683
                                      • GetCurrentProcess.KERNEL32 ref: 0148D6C0
                                      • GetCurrentThreadId.KERNEL32 ref: 0148D719
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 2409b298bce81f745935460abdc43950acd5b7e9f99c5e2553dd28d7a23d3e3c
                                      • Instruction ID: 5d090edee33c14be8aeb36ab10f6f4d6768e69a753e0cf14f03c0df7c0b89be0
                                      • Opcode Fuzzy Hash: 2409b298bce81f745935460abdc43950acd5b7e9f99c5e2553dd28d7a23d3e3c
                                      • Instruction Fuzzy Hash: CB5145B0D013498FEB14DFAAD548B9EBBF1EF48304F20846AE419A73A0D7745984CB65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 47 713e094-713e135 50 713e137-713e141 47->50 51 713e16e-713e18e 47->51 50->51 52 713e143-713e145 50->52 56 713e190-713e19a 51->56 57 713e1c7-713e1f6 51->57 54 713e147-713e151 52->54 55 713e168-713e16b 52->55 58 713e153 54->58 59 713e155-713e164 54->59 55->51 56->57 61 713e19c-713e19e 56->61 65 713e1f8-713e202 57->65 66 713e22f-713e2e9 CreateProcessA 57->66 58->59 59->59 60 713e166 59->60 60->55 62 713e1c1-713e1c4 61->62 63 713e1a0-713e1aa 61->63 62->57 67 713e1ae-713e1bd 63->67 68 713e1ac 63->68 65->66 69 713e204-713e206 65->69 79 713e2f2-713e378 66->79 80 713e2eb-713e2f1 66->80 67->67 70 713e1bf 67->70 68->67 71 713e229-713e22c 69->71 72 713e208-713e212 69->72 70->62 71->66 74 713e216-713e225 72->74 75 713e214 72->75 74->74 76 713e227 74->76 75->74 76->71 90 713e37a-713e37e 79->90 91 713e388-713e38c 79->91 80->79 90->91 92 713e380 90->92 93 713e38e-713e392 91->93 94 713e39c-713e3a0 91->94 92->91 93->94 95 713e394 93->95 96 713e3a2-713e3a6 94->96 97 713e3b0-713e3b4 94->97 95->94 96->97 98 713e3a8 96->98 99 713e3c6-713e3cd 97->99 100 713e3b6-713e3bc 97->100 98->97 101 713e3e4 99->101 102 713e3cf-713e3de 99->102 100->99 104 713e3e5 101->104 102->101 104->104
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0713E2D6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 4b56f7f40cdcbb39d51a92242b612f39dd724896fb4d9a95e88a2a283e4b315d
                                      • Instruction ID: 162ee3b992e9ab7d152e55ccd26e1da4af1261216135790779ae9e08c7fc47a4
                                      • Opcode Fuzzy Hash: 4b56f7f40cdcbb39d51a92242b612f39dd724896fb4d9a95e88a2a283e4b315d
                                      • Instruction Fuzzy Hash: E6A12AB1D0031ADFEB25CF69C841BDDBBB2BF44310F1485A9E809A7280DB749989CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 105 713e0a0-713e135 107 713e137-713e141 105->107 108 713e16e-713e18e 105->108 107->108 109 713e143-713e145 107->109 113 713e190-713e19a 108->113 114 713e1c7-713e1f6 108->114 111 713e147-713e151 109->111 112 713e168-713e16b 109->112 115 713e153 111->115 116 713e155-713e164 111->116 112->108 113->114 118 713e19c-713e19e 113->118 122 713e1f8-713e202 114->122 123 713e22f-713e2e9 CreateProcessA 114->123 115->116 116->116 117 713e166 116->117 117->112 119 713e1c1-713e1c4 118->119 120 713e1a0-713e1aa 118->120 119->114 124 713e1ae-713e1bd 120->124 125 713e1ac 120->125 122->123 126 713e204-713e206 122->126 136 713e2f2-713e378 123->136 137 713e2eb-713e2f1 123->137 124->124 127 713e1bf 124->127 125->124 128 713e229-713e22c 126->128 129 713e208-713e212 126->129 127->119 128->123 131 713e216-713e225 129->131 132 713e214 129->132 131->131 133 713e227 131->133 132->131 133->128 147 713e37a-713e37e 136->147 148 713e388-713e38c 136->148 137->136 147->148 149 713e380 147->149 150 713e38e-713e392 148->150 151 713e39c-713e3a0 148->151 149->148 150->151 152 713e394 150->152 153 713e3a2-713e3a6 151->153 154 713e3b0-713e3b4 151->154 152->151 153->154 155 713e3a8 153->155 156 713e3c6-713e3cd 154->156 157 713e3b6-713e3bc 154->157 155->154 158 713e3e4 156->158 159 713e3cf-713e3de 156->159 157->156 161 713e3e5 158->161 159->158 161->161
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0713E2D6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: fcb95d1f5d24e694fafedabc29d17076354be4ef1f131b7cbbe5221bde05746a
                                      • Instruction ID: 26bcb96585bb1a305f3649e3627a799cad25b9a974dc7d2ecd04be08f1b3a897
                                      • Opcode Fuzzy Hash: fcb95d1f5d24e694fafedabc29d17076354be4ef1f131b7cbbe5221bde05746a
                                      • Instruction Fuzzy Hash: 5A911AB1D0031ADFEB25DF69C841BDDBBB2BF44310F1485A9E809A7280DB759989CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 162 148af19-148af37 163 148af39-148af46 call 14898a0 162->163 164 148af63-148af67 162->164 171 148af48 163->171 172 148af5c 163->172 166 148af69-148af73 164->166 167 148af7b-148afbc 164->167 166->167 173 148afc9-148afd7 167->173 174 148afbe-148afc6 167->174 219 148af4e call 148b1c0 171->219 220 148af4e call 148b1b0 171->220 172->164 175 148afd9-148afde 173->175 176 148affb-148affd 173->176 174->173 178 148afe9 175->178 179 148afe0-148afe7 call 148a270 175->179 181 148b000-148b007 176->181 177 148af54-148af56 177->172 180 148b098-148b116 177->180 183 148afeb-148aff9 178->183 179->183 212 148b118-148b119 180->212 213 148b11a-148b158 180->213 184 148b009-148b011 181->184 185 148b014-148b01b 181->185 183->181 184->185 186 148b028-148b031 call 148a280 185->186 187 148b01d-148b025 185->187 193 148b03e-148b043 186->193 194 148b033-148b03b 186->194 187->186 195 148b061-148b06e 193->195 196 148b045-148b04c 193->196 194->193 202 148b070-148b08e 195->202 203 148b091-148b097 195->203 196->195 198 148b04e-148b05e call 148a290 call 148a2a0 196->198 198->195 202->203 212->213 214 148b15a-148b15d 213->214 215 148b160-148b18b GetModuleHandleW 213->215 214->215 216 148b18d-148b193 215->216 217 148b194-148b1a8 215->217 216->217 219->177 220->177
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0148B17E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 09e4b50f8b4a10c4d3d05edf8ca55765a8ad69926b8ea0d7b9763381188a059b
                                      • Instruction ID: e9c5c06062cdfa7cc7e89e5264aea52d631b15b7f0a837fdb612378903ad6c1f
                                      • Opcode Fuzzy Hash: 09e4b50f8b4a10c4d3d05edf8ca55765a8ad69926b8ea0d7b9763381188a059b
                                      • Instruction Fuzzy Hash: 308145B0A00B058FE725EF2AC45475BBBF1FF48204F10892ED59A9BB60D775E846CB94

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 221 148590c-148590e 222 1485910 221->222 223 1485912 221->223 222->223 224 1485914-1485915 223->224 225 1485916-148598c 223->225 224->225 227 148598f-14859d9 CreateActCtxA 225->227 229 14859db-14859e1 227->229 230 14859e2-1485a3c 227->230 229->230 237 1485a4b-1485a4f 230->237 238 1485a3e-1485a41 230->238 239 1485a60 237->239 240 1485a51-1485a5d 237->240 238->237 242 1485a61 239->242 240->239 242->242
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 014859C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 87caa2efe0460ec1e15069b2dcdbfac01a29ac3aaecc9c79da5bd623c4255b96
                                      • Instruction ID: 92837c96cfef18e833e87cfdb86afa60f6d291cb9e351160ca1c7b5792e35e8b
                                      • Opcode Fuzzy Hash: 87caa2efe0460ec1e15069b2dcdbfac01a29ac3aaecc9c79da5bd623c4255b96
                                      • Instruction Fuzzy Hash: 2C41E3B0C00719CBEF24DFAAC884BDEBBB5BF49314F20806AD409AB255DB755946CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 243 1485a84-1485b14
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b042f8cc073a5540888329302adeaeef3860ff6d1de869a10fe64a3ab0f7512c
                                      • Instruction ID: 4472802fc87dfb6d7dfb799ad10ce03ad157d86d8eb89fd53483a7316dd4b7c4
                                      • Opcode Fuzzy Hash: b042f8cc073a5540888329302adeaeef3860ff6d1de869a10fe64a3ab0f7512c
                                      • Instruction Fuzzy Hash: 7341DD71C05348CFEF11EBA8C8857EEBBB1AF56324F20818AD445AF262C775598ACB41

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 246 148449c-14859d9 CreateActCtxA 250 14859db-14859e1 246->250 251 14859e2-1485a3c 246->251 250->251 258 1485a4b-1485a4f 251->258 259 1485a3e-1485a41 251->259 260 1485a60 258->260 261 1485a51-1485a5d 258->261 259->258 263 1485a61 260->263 261->260 263->263
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 014859C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 43709a0fbd876be5355dbceea208c10bf2c575d813da7d2ef69e55599e55e5eb
                                      • Instruction ID: 73453455c5b6d995f798624a64636ebb6c781b1e751032c5f12fe56d1c577b40
                                      • Opcode Fuzzy Hash: 43709a0fbd876be5355dbceea208c10bf2c575d813da7d2ef69e55599e55e5eb
                                      • Instruction Fuzzy Hash: 6141C470C00719CBEB24DFAAC885BDEBBB5BF45304F20806AD409AB251D7755946CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 264 7115d50-7115da4 266 7115da6-7115dac 264->266 267 7115daf-7115dbe 264->267 266->267 268 7115dc0 267->268 269 7115dc3-7115dfc DrawTextExW 267->269 268->269 270 7115e05-7115e22 269->270 271 7115dfe-7115e04 269->271 271->270
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07115DEF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465921328.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7110000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: ab37e2655d5213854766065aeb0e26513bc775b9ce2209f2a1a5d371018b93b6
                                      • Instruction ID: 7c82115d65ecddd105be088a8f46012984af407a0adcfd13a297c1633a367409
                                      • Opcode Fuzzy Hash: ab37e2655d5213854766065aeb0e26513bc775b9ce2209f2a1a5d371018b93b6
                                      • Instruction Fuzzy Hash: F031E4B5D0130A9FDB11CF9AD884ADEFBF5FB48320F14842AE815A7250D774A945CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 274 713de10-713de66 277 713de76-713deb5 WriteProcessMemory 274->277 278 713de68-713de74 274->278 280 713deb7-713debd 277->280 281 713debe-713deee 277->281 278->277 280->281
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0713DEA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: ba7c4b7d1cde40e47e3b0033ce74f0d0809f1dd22c2b8f8edd54548204149165
                                      • Instruction ID: 36f623aa14315bbad4004dd42c4862e5ee88ce08c645bd906f01bd02efc9d27a
                                      • Opcode Fuzzy Hash: ba7c4b7d1cde40e47e3b0033ce74f0d0809f1dd22c2b8f8edd54548204149165
                                      • Instruction Fuzzy Hash: DE2135B5D00349DFDB14CFAAD885BEEBBF5FB48310F10842AE958A7240C7789941CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 285 148d808-148d80a 286 148d80c 285->286 287 148d80e 285->287 286->287 290 148d852-148d8a4 DuplicateHandle 286->290 288 148d810-148d811 287->288 289 148d812-148d84f 287->289 288->289 289->290 291 148d8ad-148d8ca 290->291 292 148d8a6-148d8ac 290->292 292->291
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0148D897
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 4297805f78eacb6a5d4692a8ab75ffa3edb1696dc40446367dad8d8427383b0d
                                      • Instruction ID: f6f45476f4d9242a428be0ee53df74eb40ecb564ea0ff1ed724ef653f239471e
                                      • Opcode Fuzzy Hash: 4297805f78eacb6a5d4692a8ab75ffa3edb1696dc40446367dad8d8427383b0d
                                      • Instruction Fuzzy Hash: 123148B5C002499FDB11CF99D844BDEBFF4EB48320F14856AE968A7351C374A941CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 295 7115d58-7115da4 296 7115da6-7115dac 295->296 297 7115daf-7115dbe 295->297 296->297 298 7115dc0 297->298 299 7115dc3-7115dfc DrawTextExW 297->299 298->299 300 7115e05-7115e22 299->300 301 7115dfe-7115e04 299->301 301->300
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07115DEF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465921328.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7110000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: 62967d738aa11dc1b7fc18cb89d71a8a9d1000e1b0aea68653374fba0ccbae92
                                      • Instruction ID: f2bbec5cdacdc5c7361a3734dc3f06ab7b1360a357fac6eb728783afa1ccb7af
                                      • Opcode Fuzzy Hash: 62967d738aa11dc1b7fc18cb89d71a8a9d1000e1b0aea68653374fba0ccbae92
                                      • Instruction Fuzzy Hash: A921F2B5D0030A9FDB11CF9AD884A9EFBF5FB48310F14842AE829A7350D374A940CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 304 713de18-713de66 306 713de76-713deb5 WriteProcessMemory 304->306 307 713de68-713de74 304->307 309 713deb7-713debd 306->309 310 713debe-713deee 306->310 307->306 309->310
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0713DEA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: ea41ba98f798465e1057d997377854043b23c0747a3b82273023701c8821928d
                                      • Instruction ID: 5044c79b04d0b690e3205b6e06b06e21196649b2959706bfaf8a18939b049d2f
                                      • Opcode Fuzzy Hash: ea41ba98f798465e1057d997377854043b23c0747a3b82273023701c8821928d
                                      • Instruction Fuzzy Hash: 252124B1900349DFDB14CFAAC885BDEBBF5FF48310F10842AE958A7240D779A941CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 314 713d871-713d8c3 317 713d8d3-713d8d6 314->317 318 713d8c5-713d8d1 314->318 319 713d8dd-713d903 Wow64SetThreadContext 317->319 318->317 320 713d905-713d90b 319->320 321 713d90c-713d93c 319->321 320->321
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0713D8F6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 4bd7e5f4ab317bb2e10bf11dc91e6ca8aa969d85921671c5274a89d755e37a10
                                      • Instruction ID: fc51365a63b300174d785f7d5c23e71d8de8f1d21ef8cd9f54063b2ec828f4c5
                                      • Opcode Fuzzy Hash: 4bd7e5f4ab317bb2e10bf11dc91e6ca8aa969d85921671c5274a89d755e37a10
                                      • Instruction Fuzzy Hash: F0213DB1D003099FDB10DFAAD4457EEBBF4EF48314F14842AD559A7240C7789945CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 325 713df00-713df95 ReadProcessMemory 328 713df97-713df9d 325->328 329 713df9e-713dfce 325->329 328->329
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0713DF88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 5f5cdfb946d12c809e5c280af29a3bf7c4398df4a74fa2977c9d72fa8c98efb6
                                      • Instruction ID: c50e1dba8661b4c3a43d0ddc1f582994b182b72b46b6e0d0b1d464c2c062290a
                                      • Opcode Fuzzy Hash: 5f5cdfb946d12c809e5c280af29a3bf7c4398df4a74fa2977c9d72fa8c98efb6
                                      • Instruction Fuzzy Hash: 1F2116B1D013599FDB10DFAAD881BDEBBF5FF48310F50842AE958A7244C7799941CBA0
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0713DF88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 15862fb25b3249739bfc75afc671f624110811d7bb18db5f485625a945d5fb9b
                                      • Instruction ID: cbc5306a1de1c08659ab97e36907263203cdc621f09f5c21f28d440b57527c62
                                      • Opcode Fuzzy Hash: 15862fb25b3249739bfc75afc671f624110811d7bb18db5f485625a945d5fb9b
                                      • Instruction Fuzzy Hash: 662125B1D003599FDB10CFAAC881BEEBBF5FF48310F10842AE958A7240C7799941CBA0
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0713D8F6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 6b3cbbf266a635e0bd3ce8206265409277db429a4d59ea9fac59d34d5c83f516
                                      • Instruction ID: 56dc651b6d58c93da9683c24f3300b63d4111456728506dc36ba2210448b778b
                                      • Opcode Fuzzy Hash: 6b3cbbf266a635e0bd3ce8206265409277db429a4d59ea9fac59d34d5c83f516
                                      • Instruction Fuzzy Hash: E92129B1D003099FDB10DFAAC4857EEBBF4EF48310F14842AD959A7281D778A945CFA4
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0148D897
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 0d4f657f467744ed4d535f0f5f22240105ab8de6d39362845174b67471133ff7
                                      • Instruction ID: f565d31dc9c3f9f749c541c580efc8c38add0055dff12782fed0038104191e26
                                      • Opcode Fuzzy Hash: 0d4f657f467744ed4d535f0f5f22240105ab8de6d39362845174b67471133ff7
                                      • Instruction Fuzzy Hash: 6221E2B5D01209EFDB10CFAAD884ADEBBF8EB48310F14841AE918A3350D374A940CFA5
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0713DDC6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: a4b9277753f4ce18d065a97bfbc82302f9d3e0a718a6805c0d38f5ee177fc933
                                      • Instruction ID: 48409b71559cd80852c7c3cf40edb537720ce50d62e9721d1e1b2a6f1ea21b3d
                                      • Opcode Fuzzy Hash: a4b9277753f4ce18d065a97bfbc82302f9d3e0a718a6805c0d38f5ee177fc933
                                      • Instruction Fuzzy Hash: A11156729003499FDB20DFAAD844BEEBBF9EF48320F148419E955A7640C775A940CFA0
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 89e419e3fcc80d02834718413df0392e67a9c0d74f3209a46f9fafa5dbeca223
                                      • Instruction ID: 6fa6cce7285f287c0fe473faa36b6fae786f86f900db45ed7bae625441d140ce
                                      • Opcode Fuzzy Hash: 89e419e3fcc80d02834718413df0392e67a9c0d74f3209a46f9fafa5dbeca223
                                      • Instruction Fuzzy Hash: 54116AB1D003498FDB20DFAAD4457EEFBF4EB88320F14842AD419A7240C779A941CFA4
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0713DDC6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 5ac77dbb65e88379815810ebbf1a8dd323fbf102f71cbb84593056613ab1b13e
                                      • Instruction ID: 2fdf36442ba7bdc56524816f6456c680c84d1f32c2c0f6e380cb67561cacb01a
                                      • Opcode Fuzzy Hash: 5ac77dbb65e88379815810ebbf1a8dd323fbf102f71cbb84593056613ab1b13e
                                      • Instruction Fuzzy Hash: 621137B19003499FDF20DFAAD844BDEBBF5EF48320F148819E955A7250C779A941CFA0
                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 07140495
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1466035639.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7140000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 3d3d01eeafcf0b50239af864fcef9610640ad2b898e2f2523090aa31450b7562
                                      • Instruction ID: cd5ee50572159b1f47ace7fda82f0589f0cccc0138825a3640de1af31a4c242a
                                      • Opcode Fuzzy Hash: 3d3d01eeafcf0b50239af864fcef9610640ad2b898e2f2523090aa31450b7562
                                      • Instruction Fuzzy Hash: F611F5B5900349DFDB20CF9AD845BDEBFF4EB48320F14885AD958A7240C375A984CFA1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 637ce1f1186491740d345618076ca93b5e8ec43a6e8c70bbc932ac45a89d8846
                                      • Instruction ID: 10a4660671322652df766c779c647815c746394d705a8903f90001daaf92d79c
                                      • Opcode Fuzzy Hash: 637ce1f1186491740d345618076ca93b5e8ec43a6e8c70bbc932ac45a89d8846
                                      • Instruction Fuzzy Hash: 98113AB1D003498FDB20DFAAD4457DEFBF4EB88320F148419D459A7240C779A941CF94
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0148B17E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 87d24ca0fb74d1d3ad5042985f7a961ad995f79600fd0d72939e8b2f54f4a238
                                      • Instruction ID: 9a3f568f31c653ef1cc7c1e7327b3c56ee72776e07a608e80d4d512dc574ab33
                                      • Opcode Fuzzy Hash: 87d24ca0fb74d1d3ad5042985f7a961ad995f79600fd0d72939e8b2f54f4a238
                                      • Instruction Fuzzy Hash: B11113B5C003498FDB20DF9AC844BDEFBF4EB48210F10841AD828A7310C375A545CFA1
                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 07140495
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1466035639.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7140000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: d68147ae2b3beaf14c6585fda154ffd8b6112d955b6242851d2b060d38118d61
                                      • Instruction ID: e061450c6a4726fa6823613df7032a85db748415500acf9980063ab83f8bef74
                                      • Opcode Fuzzy Hash: d68147ae2b3beaf14c6585fda154ffd8b6112d955b6242851d2b060d38118d61
                                      • Instruction Fuzzy Hash: 0411E5B5800349DFDB10CF9AC845BDEFBF8EB48320F14845AE958A7240C375A944CFA5
                                      APIs
                                      • CloseHandle.KERNELBASE(?), ref: 054E3F08
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465089813.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_54e0000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: CloseHandle
                                      • String ID:
                                      • API String ID: 2962429428-0
                                      • Opcode ID: ad632183c3d304884ff095e405953fea1c538824b3ce5e05bdd946244ad72f8c
                                      • Instruction ID: e70bab772487394ba77635540741c55316d36c22f68be0614088e7ed1e7e02e5
                                      • Opcode Fuzzy Hash: ad632183c3d304884ff095e405953fea1c538824b3ce5e05bdd946244ad72f8c
                                      • Instruction Fuzzy Hash: 4C1166B1800349CFDB10CF9AC445BDEBBF4EB48320F10845AE968A7341C338A984CFA4
                                      APIs
                                      • CloseHandle.KERNELBASE(?), ref: 054E3F08
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465089813.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_54e0000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: CloseHandle
                                      • String ID:
                                      • API String ID: 2962429428-0
                                      • Opcode ID: 08396b4304128fecf1e7bf38f943d8b795fe6098a9cf7a3720fa6d823b8b1b13
                                      • Instruction ID: 084d5445287fcad27440c56b2ae710dda17f91cb8faff70f917abe8cf9c2cb19
                                      • Opcode Fuzzy Hash: 08396b4304128fecf1e7bf38f943d8b795fe6098a9cf7a3720fa6d823b8b1b13
                                      • Instruction Fuzzy Hash: CA1103B5800349CFDB20DF9AC545BDEBBF4EB48320F10845AD968A7341D379A945CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1459960780.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13ed000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ffec341747c3c6966333be3bf6472d01917ab92884d057648b55872acb0e6f08
                                      • Instruction ID: ac7e18e2a6874c220f6b016dd6ed16f97723b47d73b200facd1852ac015bc964
                                      • Opcode Fuzzy Hash: ffec341747c3c6966333be3bf6472d01917ab92884d057648b55872acb0e6f08
                                      • Instruction Fuzzy Hash: A1214872500308DFDB05DF44D9C8B56BBA5FB94318F20C169E9091B286C736E456CAA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460067022.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13fd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42e468cc6e171fd960f9635e73ed443894f00a8e0405e0db881083c189e09add
                                      • Instruction ID: fbe634e3bf740b3975fdd616e00e1611feaa4f45d934000b14b835185e53eafb
                                      • Opcode Fuzzy Hash: 42e468cc6e171fd960f9635e73ed443894f00a8e0405e0db881083c189e09add
                                      • Instruction Fuzzy Hash: 0E213471604304EFDB15DF54D9C8B16BB65FB84318F20C56DEA0A4B386C33AD847CA62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460067022.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13fd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 397b0f15dce17efc9c4dbeac97db5ff4ba51fde391863db10b5e4478c3dd018a
                                      • Instruction ID: 61af909c996fbe3c11c41888f1a6bfda7a1c1daa012c8f72a4ffd481ff153075
                                      • Opcode Fuzzy Hash: 397b0f15dce17efc9c4dbeac97db5ff4ba51fde391863db10b5e4478c3dd018a
                                      • Instruction Fuzzy Hash: B0212975504304FFDB05DF94D5C8B16BB65FB84328F20C56DEA094B256C376D446CAA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460067022.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13fd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42ebf91378d0f07d79d19a875e53c26a782fce99517e0f4ad3f8f2e93f6472b5
                                      • Instruction ID: fdaf3fdbcd3f308b8c5a25b9cd634fcab9e87f436b58423df90e60c746152b20
                                      • Opcode Fuzzy Hash: 42ebf91378d0f07d79d19a875e53c26a782fce99517e0f4ad3f8f2e93f6472b5
                                      • Instruction Fuzzy Hash: 4A219F755093808FCB07CF24D994715BF71EB46218F28C5EED9498F2A7C33A980ACB62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1459960780.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13ed000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a736483c7301ab0b942446287a2da93ee8c90a3553c7a0be40e84c1f23337044
                                      • Instruction ID: 34f4ae995f8f63d877856b952f0319db6b13411da815d05613cee29042992de1
                                      • Opcode Fuzzy Hash: a736483c7301ab0b942446287a2da93ee8c90a3553c7a0be40e84c1f23337044
                                      • Instruction Fuzzy Hash: 8111CD76404280CFCB06CF44D5C4B56BFA1FB94224F2482A9D8090A256C33AE456CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460067022.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13fd000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: af0032d31c21eee98164703ed9ecbad4511e5bcd2f12e312fdd1ff5dc5c24f5f
                                      • Instruction ID: 2f70f0258eb997cba718b1b3159c44e9170c522b76245fbcbb7c8fa9c0843069
                                      • Opcode Fuzzy Hash: af0032d31c21eee98164703ed9ecbad4511e5bcd2f12e312fdd1ff5dc5c24f5f
                                      • Instruction Fuzzy Hash: 7511BE79504240DFCB06CF54C6C4B15BB71FB84228F24C6AED9494B256C33AD40ACB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1466035639.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07140000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7140000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d3b239700e17f5e94640d8a679952abe0ef27a26285117087578d5469062140b
                                      • Instruction ID: 040160d72035362b77d2e2f9188b55fb14e3b61b8e71fb2259ac217ddc80ce63
                                      • Opcode Fuzzy Hash: d3b239700e17f5e94640d8a679952abe0ef27a26285117087578d5469062140b
                                      • Instruction Fuzzy Hash: F3D1CEB170060A9FD71AEB76C850B6EB7F6AF89601F24846ED146DB3E0DB34D881C751
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9c42ddff020a8e6b8baf207d14bee69846f4b42e40ec66608a477f4ed257f187
                                      • Instruction ID: aa241995d719fa9305a16c47bf24fe94444c57c7a4b5eefca01a9e1740c08d65
                                      • Opcode Fuzzy Hash: 9c42ddff020a8e6b8baf207d14bee69846f4b42e40ec66608a477f4ed257f187
                                      • Instruction Fuzzy Hash: D0E10CB4E042598FDB24DF99C580AAEFBF2FF89305F248169D454A7359D7309942CF60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0a20231bbc2a0d8d7f41d91f5107857b696f660c517228485692716b57d73ee4
                                      • Instruction ID: d48283bb0946126031c4c22d28ddfb07a9f144bbdbd10d75621d355cf46aa0e5
                                      • Opcode Fuzzy Hash: 0a20231bbc2a0d8d7f41d91f5107857b696f660c517228485692716b57d73ee4
                                      • Instruction Fuzzy Hash: C8E10BB4E042598FDB24DFA9C580AAEFBB2FF89305F248169D415AB355D7309D42CF60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8ca1d6fc6f94cd08af1e1bd708590bc4008e7ac7554f45081c585019c02f3ab3
                                      • Instruction ID: 35159446a6098f2d2cd771fa62beedbfa49174adbb84cf161ba8f684aa440afc
                                      • Opcode Fuzzy Hash: 8ca1d6fc6f94cd08af1e1bd708590bc4008e7ac7554f45081c585019c02f3ab3
                                      • Instruction Fuzzy Hash: 73E11AB4E002598FDB14DFA9D580AAEFBB2FF89305F248169D454AB359D730AD42CF60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6b068db562feaa2b7091beb8bd79dbafe8c23b5bf8bc4a7e90b7ae4a870ccab4
                                      • Instruction ID: 117a17face0ca62357f04f3b9783f291ca2ab08927ad3beb8b2948da20dc344f
                                      • Opcode Fuzzy Hash: 6b068db562feaa2b7091beb8bd79dbafe8c23b5bf8bc4a7e90b7ae4a870ccab4
                                      • Instruction Fuzzy Hash: DAE12EB4E0425A8FDB14DF99C580AAEFBF2FF89305F248169D415AB359D730A941CF60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 315061fd786d441daee305f4197b8172fce31dba3c6209d7428cece33c84b5e3
                                      • Instruction ID: 263b4ac86d707cbfd51b5486536a9936bf85e96b8b71ead08ff7cd2d99a01bdb
                                      • Opcode Fuzzy Hash: 315061fd786d441daee305f4197b8172fce31dba3c6209d7428cece33c84b5e3
                                      • Instruction Fuzzy Hash: D6E11CB4E1025A8FDB14DFA9C580AAEFBB2FF89305F248169D414B7395D730A941DFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465089813.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_54e0000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fc030da70204f31b80d8754e89ac13dbf9fa4ac57338c0e5d1790e720b6b3b46
                                      • Instruction ID: 848a5bf2fbdae43a7400729c122a9ae4eb1265e9dd16642999db0a20efaa353f
                                      • Opcode Fuzzy Hash: fc030da70204f31b80d8754e89ac13dbf9fa4ac57338c0e5d1790e720b6b3b46
                                      • Instruction Fuzzy Hash: 8CD1F831D20B1A8ADB11EB68D99469DB7B1FF96200F50C79AE40977260EF70AEC4CF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1460310986.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1480000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 05db9c642b98b45039373f40cd36914ccd5220760fd3af1f6001181ca9417235
                                      • Instruction ID: 8f4f6e68df45f9f1a843b756a786553bef3be8d637eaa55f1ff0eb629fdd7ceb
                                      • Opcode Fuzzy Hash: 05db9c642b98b45039373f40cd36914ccd5220760fd3af1f6001181ca9417235
                                      • Instruction Fuzzy Hash: B8A18036E0020ACFCF05EFB5C84059EBBB2FF95300B25856AE905AB365DB71E959CB40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465089813.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_54e0000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 133e829ccd56f66ef2b3c128fb173f3b3a26acf34f0ee971b786a91bd6143999
                                      • Instruction ID: 6bd220ec672a884f31c0c07197575b9f7b4a268a670ccd3457b9d9ab9d5d1620
                                      • Opcode Fuzzy Hash: 133e829ccd56f66ef2b3c128fb173f3b3a26acf34f0ee971b786a91bd6143999
                                      • Instruction Fuzzy Hash: BED1F831D20B1A8ADB11EB68D9946ADB7B1FF96200F50C79AE40977260EF706EC4CF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1465999472.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 82207ce6361a9b6892308197144746951ba6f28a21cbe37af332e5ba548ceafd
                                      • Instruction ID: 2599dff45a24cb62d386f3ba7e10d90bacb8e6802bf480793ca7be363a1e8cdc
                                      • Opcode Fuzzy Hash: 82207ce6361a9b6892308197144746951ba6f28a21cbe37af332e5ba548ceafd
                                      • Instruction Fuzzy Hash: C4514DB0E042598FDB14CFA9C9805AEFBF6FF89300F24816AD414AB356D7319942CFA1

                                      Execution Graph

                                      Execution Coverage:13.2%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:83
                                      Total number of Limit Nodes:4
                                      execution_graph 27309 2f9ced8 27310 2f9cee4 27309->27310 27311 2f9d112 27310->27311 27314 6c45190 27310->27314 27318 6c45182 27310->27318 27315 6c4519f 27314->27315 27322 6c4497c 27315->27322 27319 6c45190 27318->27319 27320 6c4497c GetModuleHandleW 27319->27320 27321 6c451c0 27320->27321 27321->27311 27323 6c44987 27322->27323 27326 6c460dc 27323->27326 27325 6c46b46 27325->27325 27327 6c460e7 27326->27327 27328 6c4766c 27327->27328 27331 6c48f00 27327->27331 27336 6c48ef8 27327->27336 27328->27325 27332 6c48f21 27331->27332 27333 6c48f45 27332->27333 27341 6c490b0 27332->27341 27345 6c490a8 27332->27345 27333->27328 27338 6c48f00 27336->27338 27337 6c48f45 27337->27328 27338->27337 27339 6c490b0 GetModuleHandleW 27338->27339 27340 6c490a8 GetModuleHandleW 27338->27340 27339->27337 27340->27337 27342 6c490bd 27341->27342 27343 6c490f6 27342->27343 27349 6c47304 27342->27349 27343->27333 27346 6c490b0 27345->27346 27347 6c490f6 27346->27347 27348 6c47304 GetModuleHandleW 27346->27348 27347->27333 27348->27347 27350 6c4730f 27349->27350 27352 6c49168 27350->27352 27353 6c47338 27350->27353 27352->27352 27354 6c47343 27353->27354 27360 6c47348 27354->27360 27356 6c491d7 27364 6c4e95b 27356->27364 27370 6c4e968 27356->27370 27357 6c49211 27357->27352 27363 6c47353 27360->27363 27361 6c4a758 27361->27356 27362 6c48f00 GetModuleHandleW 27362->27361 27363->27361 27363->27362 27366 6c4e9e5 27364->27366 27367 6c4e999 27364->27367 27365 6c4e9a5 27365->27357 27366->27357 27367->27365 27376 6c4ebd0 27367->27376 27380 6c4ebe0 27367->27380 27372 6c4e999 27370->27372 27373 6c4e9e5 27370->27373 27371 6c4e9a5 27371->27357 27372->27371 27374 6c4ebd0 GetModuleHandleW 27372->27374 27375 6c4ebe0 GetModuleHandleW 27372->27375 27373->27357 27374->27373 27375->27373 27384 6c4ec20 27376->27384 27391 6c4ec30 27376->27391 27377 6c4ebea 27377->27366 27381 6c4ebea 27380->27381 27382 6c4ec20 GetModuleHandleW 27380->27382 27383 6c4ec30 GetModuleHandleW 27380->27383 27381->27366 27382->27381 27383->27381 27385 6c4ec30 27384->27385 27386 6c4e114 GetModuleHandleW 27385->27386 27388 6c4ec5c 27385->27388 27387 6c4ec4c 27386->27387 27387->27388 27389 6c4eec8 GetModuleHandleW 27387->27389 27390 6c4eeb9 GetModuleHandleW 27387->27390 27388->27377 27389->27388 27390->27388 27392 6c4ec41 27391->27392 27395 6c4ec5c 27391->27395 27393 6c4e114 GetModuleHandleW 27392->27393 27394 6c4ec4c 27393->27394 27394->27395 27396 6c4eec8 GetModuleHandleW 27394->27396 27397 6c4eeb9 GetModuleHandleW 27394->27397 27395->27377 27396->27395 27397->27395 27398 6c46298 27399 6c462de 27398->27399 27403 6c46478 27399->27403 27407 6c46469 27399->27407 27400 6c463cb 27404 6c4647d 27403->27404 27411 6c4600c 27404->27411 27408 6c46478 27407->27408 27409 6c4600c DuplicateHandle 27408->27409 27410 6c464a6 27409->27410 27410->27400 27412 6c464e0 DuplicateHandle 27411->27412 27413 6c464a6 27412->27413 27413->27400
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f99cfeead411689ecbfd5fa0045dbbe5939fbec9e28257d16ee90ca8e5c4a741
                                      • Instruction ID: 240d59243465857bb19f06975b71335e9014b927f6bb7f566820af2168e37e3b
                                      • Opcode Fuzzy Hash: f99cfeead411689ecbfd5fa0045dbbe5939fbec9e28257d16ee90ca8e5c4a741
                                      • Instruction Fuzzy Hash: AE724C71A002199FEF15CFA9C994AAEBBB6FF88344F148469E505EB3A1DB34DC41CB50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3d37c988f5d443c8da9858e238788261d6cf544a1029f273155c54ee40d7ddcf
                                      • Instruction ID: 72fc7b2472561a49b81904b2f82e74b6d7906a6a543110c952c7d370656458fd
                                      • Opcode Fuzzy Hash: 3d37c988f5d443c8da9858e238788261d6cf544a1029f273155c54ee40d7ddcf
                                      • Instruction Fuzzy Hash: 57728D71A00209DFEF15CF68C884AAEBBB2FF88344F158559E915AB2A1D770ED85CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1426 2f93580-2f9358d 1427 2f9358f-2f93591 1426->1427 1428 2f93596-2f935a6 1426->1428 1431 2f93834-2f9383b 1427->1431 1429 2f935a8 1428->1429 1430 2f935ad-2f935bd 1428->1430 1429->1431 1433 2f9381b-2f93829 1430->1433 1434 2f935c3-2f935d1 1430->1434 1437 2f9383c-2f93922 1433->1437 1439 2f9382b-2f9382f call 2f902c8 1433->1439 1434->1437 1438 2f935d7 1434->1438 1509 2f93929-2f93a31 call 2f90828 call 2f91e28 call 2f91e38 call 2f91e48 call 2f902e4 1437->1509 1510 2f93924 1437->1510 1438->1437 1440 2f9361b-2f9363d 1438->1440 1441 2f936da-2f93702 1438->1441 1442 2f935de-2f935f0 1438->1442 1443 2f935f5-2f93616 1438->1443 1444 2f936b4-2f936d5 1438->1444 1445 2f93734-2f93771 1438->1445 1446 2f93776-2f9379c 1438->1446 1447 2f93668-2f93689 1438->1447 1448 2f937ec-2f9380d call 2f92060 1438->1448 1449 2f937cf-2f937ea call 2f902d8 1438->1449 1450 2f9380f-2f93819 1438->1450 1451 2f9368e-2f936af 1438->1451 1452 2f937a1-2f937cd 1438->1452 1453 2f93642-2f93663 1438->1453 1454 2f93707-2f9372f 1438->1454 1439->1431 1440->1431 1441->1431 1442->1431 1443->1431 1444->1431 1445->1431 1446->1431 1447->1431 1448->1431 1449->1431 1450->1431 1451->1431 1452->1431 1453->1431 1454->1431 1528 2f93a37-2f93ac7 1509->1528 1510->1509
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cdaaf9f505efc926ae7a533ddac5d329fa0a810062cf6bad01ea8c332d399bae
                                      • Instruction ID: 16f0849f8215ed0edbe8d53f90606c760acd7feeac81c90dc984128b8021b2d9
                                      • Opcode Fuzzy Hash: cdaaf9f505efc926ae7a533ddac5d329fa0a810062cf6bad01ea8c332d399bae
                                      • Instruction Fuzzy Hash: 9BF15C35F002489FDF18DFB9D854AAEBBB2BF88300B148569E906A7354DF359C02CB91
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c3d3b6486b9645d7bfc938b318374a9bf674ffc14deb741030380d5a69812d3
                                      • Instruction ID: 7c1da7bb3927b79a3be8a120544ace93a77ae45be713c4d51880b64610f33bea
                                      • Opcode Fuzzy Hash: 8c3d3b6486b9645d7bfc938b318374a9bf674ffc14deb741030380d5a69812d3
                                      • Instruction Fuzzy Hash: D1A1C474E002189FEF14DFA9D984B9DBBF2BF89340F14806AE919AB365DB349941CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6cd248e83617917dd7ce9bf36a21dd1df99cfa7f5dff6ea79c4c9db0d986a3b2
                                      • Instruction ID: 833a5c55891379e2afe8f8c593810c88179de46de427e72d8723bc1a223b740b
                                      • Opcode Fuzzy Hash: 6cd248e83617917dd7ce9bf36a21dd1df99cfa7f5dff6ea79c4c9db0d986a3b2
                                      • Instruction Fuzzy Hash: D5A1E874E00218DFEB14CFAAD984A9DBBF2FF89344F1480A9D509AB361DB359941CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d461cd19e69c874fe9f67a501cbec0abcc59c1c862c3648fb67ef8b084e5edc
                                      • Instruction ID: cccf02a55ca63c011e8049cb0e007346519c0711ecf59f255694664deac56570
                                      • Opcode Fuzzy Hash: 0d461cd19e69c874fe9f67a501cbec0abcc59c1c862c3648fb67ef8b084e5edc
                                      • Instruction Fuzzy Hash: BF81C574E002188FEF14CFAAD994B9DBBF2BF88340F14806AD919AB365DB349941CF10
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2425dbe1449c36210397824b63c727fe75b5dd7fa3fbd7568df6cacb21b84cf3
                                      • Instruction ID: cc27f5cfcb20ef77c8b78e9788215d6e5612f40f3fda1e4e90144a2b5225692d
                                      • Opcode Fuzzy Hash: 2425dbe1449c36210397824b63c727fe75b5dd7fa3fbd7568df6cacb21b84cf3
                                      • Instruction Fuzzy Hash: 2C81C474E00218CFEB14DFAAD984A9DBBF2BF89340F14806AE919A7365DB349941CF54
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9cc6015417387fdf0ce18d13f7b3c892559189f4f1a3a1b3b86ecf3811f8720b
                                      • Instruction ID: 2a3f581c17335295f730ae836fa2a35856cb6562ba086d4df14362c673497b15
                                      • Opcode Fuzzy Hash: 9cc6015417387fdf0ce18d13f7b3c892559189f4f1a3a1b3b86ecf3811f8720b
                                      • Instruction Fuzzy Hash: E781B574E00218DFEB14CFAAD984B9DBBF2BF88300F148069D919AB365DB345982CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9706e8e3d2eb67832a9f524c8c9f97c884083f7240e6b0d59091fb90f9e9cee9
                                      • Instruction ID: 2b28577606843146939fac20cf15d6c30a662752e9a22cd9dbbab6df705725c7
                                      • Opcode Fuzzy Hash: 9706e8e3d2eb67832a9f524c8c9f97c884083f7240e6b0d59091fb90f9e9cee9
                                      • Instruction Fuzzy Hash: C781A574E002188FEF14DFAAD984B9DBBF2BF88340F14806AD519AB365DB349981CF55
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d3b24de578ad093cb47d1cbd525c6e36bac11c0be304b52c5a0b73f7bb0f8317
                                      • Instruction ID: 40e3222bd27f4f12e7aff524d36a34ca87311fda735299dfc16cb202bbb8cac3
                                      • Opcode Fuzzy Hash: d3b24de578ad093cb47d1cbd525c6e36bac11c0be304b52c5a0b73f7bb0f8317
                                      • Instruction Fuzzy Hash: EC81A474E00218CFEB14DFAAD994B9DBBF2BF88300F14806AD919AB365DB349941CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ab16f61b5ae0175779bee40b5a245d9af23271acbd6b11160d6d5cc9e30e5c1
                                      • Instruction ID: 8c7776c84f82c5fba7407fe5b11fb0b7c4f337085f5374f5a222d8954a1870a5
                                      • Opcode Fuzzy Hash: 7ab16f61b5ae0175779bee40b5a245d9af23271acbd6b11160d6d5cc9e30e5c1
                                      • Instruction Fuzzy Hash: 3B81B474E00218CFEB14DFAAD984B9DBBF2BF89304F14806AD919AB365DB349941CF51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9477f78bdef800bc99b1139256788e0195c03454919812df1b931f9bee54dbd9
                                      • Instruction ID: f3c96b04611a2bd640dd650798e7ee51ace4560c250f9ba2717555ecb83ece31
                                      • Opcode Fuzzy Hash: 9477f78bdef800bc99b1139256788e0195c03454919812df1b931f9bee54dbd9
                                      • Instruction Fuzzy Hash: F661C274E006089FEF18DFAAD984A9DBBF2BF89300F14C069D918AB365DB349941CF51

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 6 6c464d8-6c464db 7 6c464e0-6c46574 DuplicateHandle 6->7 8 6c46576-6c4657c 7->8 9 6c4657d-6c4659a 7->9 8->9
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,06C464A6,?,?,?,?,?), ref: 06C46567
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3167447754.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_6c40000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 8f4a9b872e3b3dfeb482df2410811b2fb1be5d32e4b8dd711a739b99a1410b7b
                                      • Instruction ID: 837f4a584438d0e926b8fb09df77b3dce6ac20301924794be3c5b565272809f1
                                      • Opcode Fuzzy Hash: 8f4a9b872e3b3dfeb482df2410811b2fb1be5d32e4b8dd711a739b99a1410b7b
                                      • Instruction Fuzzy Hash: 0021E4B5D002099FDB10DFAAD885ADEFFF8EB48310F14801AE918A3351D379A955CFA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 6c4600c-6c46574 DuplicateHandle 2 6c46576-6c4657c 0->2 3 6c4657d-6c4659a 0->3 2->3
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,06C464A6,?,?,?,?,?), ref: 06C46567
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3167447754.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_6c40000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: cc9c99f20033d2ba64ce1eb7e19e30db98a7a8d48fbf95788bef682eecce7fc4
                                      • Instruction ID: 6c49b318c708f6e41e4dc1758a40b142375df776f24dcae88a324bb3f3e72303
                                      • Opcode Fuzzy Hash: cc9c99f20033d2ba64ce1eb7e19e30db98a7a8d48fbf95788bef682eecce7fc4
                                      • Instruction Fuzzy Hash: 2221E3B5D002099FDB10DFAAD884ADEBBF4EB48310F14801AE918A3311D378A950CFA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 12 6c4e114-6c4ee60 14 6c4ee62-6c4ee65 12->14 15 6c4ee68-6c4ee93 GetModuleHandleW 12->15 14->15 16 6c4ee95-6c4ee9b 15->16 17 6c4ee9c-6c4eeb0 15->17 16->17
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,06C4EC4C), ref: 06C4EE86
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3167447754.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_6c40000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: d0227ded3470789f635531116654856bac95c767f00d2fce7feb553d47f83eec
                                      • Instruction ID: 69ef9d905e58c37f5d7a94ed57a06b9d02bda279e25b9830ac4127f83ede4ac3
                                      • Opcode Fuzzy Hash: d0227ded3470789f635531116654856bac95c767f00d2fce7feb553d47f83eec
                                      • Instruction Fuzzy Hash: 5111F0B6D007498FDB20DF9AD484B9EFBF4EB48210F11842AD929A7200D375A946CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 19 6c4ee1b-6c4ee60 21 6c4ee62-6c4ee65 19->21 22 6c4ee68-6c4ee93 GetModuleHandleW 19->22 21->22 23 6c4ee95-6c4ee9b 22->23 24 6c4ee9c-6c4eeb0 22->24 23->24
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,06C4EC4C), ref: 06C4EE86
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3167447754.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_6c40000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 97fbb755c269a753ae39b0fd0deaf7c2ee1538f4fbc176279c4d496025f026df
                                      • Instruction ID: 50d01b76d04e10afe6c7f41c42ed1cf4ff799f72eece430fe2fbc8f91436f5be
                                      • Opcode Fuzzy Hash: 97fbb755c269a753ae39b0fd0deaf7c2ee1538f4fbc176279c4d496025f026df
                                      • Instruction Fuzzy Hash: 601102B6C002498FDB20DF9AC484BDEFBF4EF48210F11841AD829B7200C375A546CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 547 2f977f0-2f97cde 623 2f98230-2f9824a 547->623 624 2f97ce4-2f97cf4 547->624 628 2f9824c-2f98250 623->628 629 2f98251-2f98252 623->629 624->623 625 2f97cfa-2f97d0a 624->625 625->623 627 2f97d10-2f97d20 625->627 627->623 630 2f97d26-2f97d36 627->630 628->629 631 2f98259-2f98265 629->631 632 2f98254 629->632 630->623 633 2f97d3c-2f97d4c 630->633 635 2f98271-2f9828f 631->635 636 2f98267-2f9826c 631->636 632->631 633->623 634 2f97d52-2f97d62 633->634 634->623 637 2f97d68-2f97d78 634->637 647 2f98291-2f9829b 635->647 648 2f98306-2f98312 635->648 638 2f98356-2f9835b 636->638 637->623 640 2f97d7e-2f97d8e 637->640 640->623 641 2f97d94-2f97da4 640->641 641->623 643 2f97daa-2f97dba 641->643 643->623 644 2f97dc0-2f9822f 643->644 647->648 652 2f9829d-2f982a9 647->652 653 2f98329-2f98335 648->653 654 2f98314-2f98320 648->654 659 2f982ab-2f982b6 652->659 660 2f982ce-2f982d1 652->660 663 2f9834c-2f9834e 653->663 664 2f98337-2f98343 653->664 654->653 662 2f98322-2f98327 654->662 659->660 674 2f982b8-2f982c2 659->674 665 2f982e8-2f982f4 660->665 666 2f982d3-2f982df 660->666 662->638 663->638 747 2f98350 call 2f987e9 663->747 748 2f98350 call 2f987f8 663->748 664->663 672 2f98345-2f9834a 664->672 667 2f9835c-2f9836a 665->667 668 2f982f6-2f982fd 665->668 666->665 678 2f982e1-2f982e6 666->678 679 2f9836c-2f98370 667->679 680 2f98371-2f98372 667->680 668->667 673 2f982ff-2f98304 668->673 672->638 673->638 674->660 684 2f982c4-2f982c9 674->684 678->638 679->680 682 2f98379-2f9837e 680->682 683 2f98373-2f98374 680->683 686 2f9838e-2f98391 682->686 687 2f98380 682->687 683->648 688 2f98376-2f9837d 683->688 684->638 687->686 747->638 748->638
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2b66fc176341e03e24b3f5c6ac7b80afe6dea9ffa1a2855177f1122e8afa41fe
                                      • Instruction ID: 9a32eade53968c23f4e8ab597dd7821f0d93da63ae9b79d778543c61833ee3e0
                                      • Opcode Fuzzy Hash: 2b66fc176341e03e24b3f5c6ac7b80afe6dea9ffa1a2855177f1122e8afa41fe
                                      • Instruction Fuzzy Hash: F3523074A00219CFFF259BA0C850B9EBB72FF59740F5080AAC50A6B7A0DB355D86DF61

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1276 2f96e68-2f96e8d 1279 2f972bc-2f972c0 1276->1279 1280 2f96e93-2f96eb6 1276->1280 1281 2f972d9-2f972e7 1279->1281 1282 2f972c2-2f972d6 1279->1282 1289 2f96ebc-2f96ec9 1280->1289 1290 2f96f64-2f96f68 1280->1290 1287 2f972e9-2f972fe 1281->1287 1288 2f97358-2f9736d 1281->1288 1298 2f97300-2f97303 1287->1298 1299 2f97305-2f97312 1287->1299 1300 2f9736f-2f97372 1288->1300 1301 2f97374-2f97381 1288->1301 1304 2f96ed8 1289->1304 1305 2f96ecb-2f96ed6 1289->1305 1291 2f96f6a-2f96f78 1290->1291 1292 2f96fb0-2f96fb9 1290->1292 1291->1292 1310 2f96f7a-2f96f95 1291->1310 1295 2f973cf 1292->1295 1296 2f96fbf-2f96fc9 1292->1296 1311 2f973d4-2f973ea 1295->1311 1296->1279 1302 2f96fcf-2f96fd8 1296->1302 1306 2f97314-2f97355 1298->1306 1299->1306 1307 2f97383-2f973be 1300->1307 1301->1307 1308 2f96fda-2f96fdf 1302->1308 1309 2f96fe7-2f96ff3 1302->1309 1312 2f96eda-2f96edc 1304->1312 1305->1312 1356 2f973c5-2f973cc 1307->1356 1308->1309 1309->1311 1317 2f96ff9-2f96fff 1309->1317 1338 2f96fa3 1310->1338 1339 2f96f97-2f96fa1 1310->1339 1324 2f973ec 1311->1324 1325 2f973f1-2f97404 1311->1325 1312->1290 1319 2f96ee2-2f96f44 1312->1319 1320 2f97005-2f97015 1317->1320 1321 2f972a6-2f972aa 1317->1321 1368 2f96f4a-2f96f61 1319->1368 1369 2f96f46 1319->1369 1336 2f97029-2f9702b 1320->1336 1337 2f97017-2f97027 1320->1337 1321->1295 1327 2f972b0-2f972b6 1321->1327 1324->1325 1340 2f9741d-2f97424 1325->1340 1341 2f97406-2f9741c 1325->1341 1327->1279 1327->1302 1342 2f9702e-2f97034 1336->1342 1337->1342 1343 2f96fa5-2f96fa7 1338->1343 1339->1343 1342->1321 1349 2f9703a-2f97049 1342->1349 1343->1292 1350 2f96fa9 1343->1350 1352 2f9704f 1349->1352 1353 2f970f7-2f97122 call 2f96ca0 * 2 1349->1353 1350->1292 1354 2f97052-2f97063 1352->1354 1370 2f97128-2f9712c 1353->1370 1371 2f9720c-2f97226 1353->1371 1354->1311 1358 2f97069-2f9707b 1354->1358 1358->1311 1361 2f97081-2f97099 1358->1361 1424 2f9709b call 2f97438 1361->1424 1425 2f9709b call 2f97428 1361->1425 1364 2f970a1-2f970b1 1364->1321 1367 2f970b7-2f970ba 1364->1367 1372 2f970bc-2f970c2 1367->1372 1373 2f970c4-2f970c7 1367->1373 1368->1290 1369->1368 1370->1321 1374 2f97132-2f97136 1370->1374 1371->1279 1393 2f9722c-2f97230 1371->1393 1372->1373 1375 2f970cd-2f970d0 1372->1375 1373->1295 1373->1375 1378 2f97138-2f97145 1374->1378 1379 2f9715e-2f97164 1374->1379 1380 2f970d8-2f970db 1375->1380 1381 2f970d2-2f970d6 1375->1381 1396 2f97154 1378->1396 1397 2f97147-2f97152 1378->1397 1383 2f9719f-2f971a5 1379->1383 1384 2f97166-2f9716a 1379->1384 1380->1295 1382 2f970e1-2f970e5 1380->1382 1381->1380 1381->1382 1382->1295 1390 2f970eb-2f970f1 1382->1390 1387 2f971b1-2f971b7 1383->1387 1388 2f971a7-2f971ab 1383->1388 1384->1383 1385 2f9716c-2f97175 1384->1385 1391 2f97184-2f9719a 1385->1391 1392 2f97177-2f9717c 1385->1392 1394 2f971b9-2f971bd 1387->1394 1395 2f971c3-2f971c5 1387->1395 1388->1356 1388->1387 1390->1353 1390->1354 1391->1321 1392->1391 1398 2f9726c-2f97270 1393->1398 1399 2f97232-2f9723c call 2f95b50 1393->1399 1394->1321 1394->1395 1400 2f971fa-2f971fc 1395->1400 1401 2f971c7-2f971d0 1395->1401 1402 2f97156-2f97158 1396->1402 1397->1402 1398->1356 1405 2f97276-2f9727a 1398->1405 1399->1398 1413 2f9723e-2f97253 1399->1413 1400->1321 1403 2f97202-2f97209 1400->1403 1408 2f971df-2f971f5 1401->1408 1409 2f971d2-2f971d7 1401->1409 1402->1321 1402->1379 1405->1356 1410 2f97280-2f9728d 1405->1410 1408->1321 1409->1408 1415 2f9729c 1410->1415 1416 2f9728f-2f9729a 1410->1416 1413->1398 1421 2f97255-2f9726a 1413->1421 1418 2f9729e-2f972a0 1415->1418 1416->1418 1418->1321 1418->1356 1421->1279 1421->1398 1424->1364 1425->1364
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d9b91aa355bd0f102515c1ac53782dd93b700101b5854c42e443f632e6e6b03
                                      • Instruction ID: 2f9affdbef30e52bdae7c2af7919a4f9a3f0c991ae3891387a0d2f63b21ec212
                                      • Opcode Fuzzy Hash: 9d9b91aa355bd0f102515c1ac53782dd93b700101b5854c42e443f632e6e6b03
                                      • Instruction Fuzzy Hash: 02124871A102098FEF14DF69D884A9EBBF2BF48754F148569E909EB2A1DB31EC41CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1536 2f9a818-2f9a842 call 2f9a7c0 1542 2f9a848-2f9a84d 1536->1542 1543 2f9a90b 1536->1543 1542->1543 1544 2f9a853-2f9a872 1542->1544 1545 2f9a910-2f9a922 1543->1545 1548 2f9a8bb-2f9a8c0 1544->1548 1549 2f9a874-2f9a87c 1544->1549 1550 2f9a929-2f9a92c 1545->1550 1551 2f9a924-2f9a926 1545->1551 1555 2f9a8c8-2f9a8cf 1548->1555 1549->1543 1552 2f9a882-2f9a885 1549->1552 1554 2f9a92d-2f9a94f 1550->1554 1553 2f9a928 1551->1553 1551->1554 1552->1543 1556 2f9a88b-2f9a8aa 1552->1556 1553->1550 1559 2f9a951-2f9a954 1554->1559 1560 2f9a957-2f9a95f 1554->1560 1557 2f9a8fe-2f9a908 1555->1557 1558 2f9a8d1-2f9a8d7 1555->1558 1556->1543 1576 2f9a8ac-2f9a8b2 1556->1576 1558->1545 1561 2f9a8d9-2f9a8f6 1558->1561 1559->1560 1562 2f9a961-2f9a967 1560->1562 1563 2f9a9c7-2f9a9ce 1560->1563 1561->1557 1562->1563 1567 2f9a969-2f9a96f 1562->1567 1565 2f9aad3-2f9aadc 1563->1565 1566 2f9a9d4-2f9a9db 1563->1566 1569 2f9aade-2f9aae4 1565->1569 1570 2f9aae6-2f9aae9 1565->1570 1571 2f9aa8a-2f9aa90 1566->1571 1572 2f9a9e1-2f9a9e9 1566->1572 1574 2f9abf9-2f9ac01 1567->1574 1575 2f9a975-2f9a982 1567->1575 1569->1570 1577 2f9ab00-2f9ab04 1569->1577 1578 2f9aaef-2f9aafd 1570->1578 1579 2f9abf4 1570->1579 1571->1574 1582 2f9aa96-2f9aaa0 1571->1582 1572->1579 1580 2f9a9ef-2f9a9f8 1572->1580 1594 2f9ac7c-2f9ac87 1574->1594 1595 2f9ac03-2f9ac0a 1574->1595 1575->1574 1581 2f9a988-2f9a9b0 1575->1581 1576->1545 1583 2f9a8b4-2f9a8b8 1576->1583 1586 2f9ab0a-2f9ab13 1577->1586 1587 2f9ab87-2f9ab8b 1577->1587 1578->1577 1579->1574 1580->1574 1584 2f9a9fe-2f9aa31 1580->1584 1581->1579 1624 2f9a9b6-2f9a9b9 1581->1624 1582->1574 1589 2f9aaa6-2f9aac2 1582->1589 1583->1548 1629 2f9aa7b-2f9aa88 1584->1629 1630 2f9aa33 1584->1630 1586->1587 1593 2f9ab15-2f9ab1b 1586->1593 1591 2f9abea-2f9abf1 1587->1591 1592 2f9ab8d-2f9ab96 1587->1592 1625 2f9aaca-2f9aacd 1589->1625 1592->1579 1599 2f9ab98-2f9ab9f 1592->1599 1593->1574 1600 2f9ab21-2f9ab2b 1593->1600 1608 2f9ac89-2f9ac8b 1594->1608 1601 2f9ac0c 1595->1601 1602 2f9ac11-2f9ac2f 1595->1602 1599->1591 1606 2f9aba1 1599->1606 1600->1574 1603 2f9ab31-2f9ab3e 1600->1603 1601->1602 1616 2f9ac3e-2f9ac42 1602->1616 1617 2f9ac31-2f9ac3c 1602->1617 1603->1574 1607 2f9ab44-2f9ab6f 1603->1607 1612 2f9aba4-2f9abac 1606->1612 1607->1574 1649 2f9ab75-2f9ab7d 1607->1649 1613 2f9acb9-2f9acca 1608->1613 1614 2f9ac8d-2f9ac9a call 2f9a340 1608->1614 1618 2f9abae-2f9abba 1612->1618 1619 2f9abe0-2f9abe3 1612->1619 1614->1613 1639 2f9ac9c-2f9acab 1614->1639 1626 2f9ac54 1616->1626 1627 2f9ac44-2f9ac52 1616->1627 1617->1616 1618->1574 1621 2f9abbc-2f9abd8 1618->1621 1619->1579 1628 2f9abe5-2f9abe8 1619->1628 1621->1619 1624->1579 1632 2f9a9bf-2f9a9c5 1624->1632 1625->1565 1625->1579 1634 2f9ac56-2f9ac58 1626->1634 1627->1634 1628->1591 1628->1612 1629->1625 1636 2f9aa36-2f9aa3c 1630->1636 1632->1562 1632->1563 1640 2f9ac5a-2f9ac5c 1634->1640 1641 2f9ac5e-2f9ac66 1634->1641 1636->1574 1642 2f9aa42-2f9aa63 1636->1642 1639->1613 1650 2f9acad-2f9acb7 1639->1650 1640->1641 1641->1608 1643 2f9ac68-2f9ac7a 1641->1643 1642->1579 1655 2f9aa69-2f9aa6d 1642->1655 1643->1594 1643->1608 1649->1579 1652 2f9ab7f-2f9ab85 1649->1652 1650->1613 1652->1587 1652->1593 1655->1579 1656 2f9aa73-2f9aa79 1655->1656 1656->1629 1656->1636
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 01f58e1ce64ba0883c7a306c9d6edd70652d68ed9d85c130252e50f904d2f870
                                      • Instruction ID: 6276bd0223c2e8f74d45f81b19fc5a6f8f546281e75fb339ea51576319b0e36b
                                      • Opcode Fuzzy Hash: 01f58e1ce64ba0883c7a306c9d6edd70652d68ed9d85c130252e50f904d2f870
                                      • Instruction Fuzzy Hash: 81F10A75E006158FDF05DFADC884AADBBF2BF88354B1A8059E615AB361CB35EC41CB50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1657 2f90c8f-2f90c92 1658 2f90c99-2f90c9a 1657->1658 1659 2f90c94-2f90c98 1657->1659 1660 2f90c9c-2f90c9f 1658->1660 1661 2f90ca1-2f90cc0 1658->1661 1659->1658 1660->1661 1662 2f90cc2 1661->1662 1663 2f90cc7-2f90d10 call 2f9070c 1661->1663 1662->1663 1670 2f90d15 1663->1670 1671 2f90d1e-2f90d4e call 2f9070c * 2 1670->1671 1678 2f90d53 1671->1678 1679 2f90d5c-2f90eda call 2f9070c * 5 1678->1679 1714 2f90ee2-2f90eeb 1679->1714 1800 2f90eee call 2f91f08 1714->1800 1801 2f90eee call 2f91f61 1714->1801 1715 2f90ef4-2f90f09 1802 2f90f0c call 2f93428 1715->1802 1803 2f90f0c call 2f93418 1715->1803 1717 2f90f12-2f90f1b 1804 2f90f1e call 2f938f9 1717->1804 1805 2f90f1e call 2f93908 1717->1805 1806 2f90f1e call 2f93580 1717->1806 1807 2f90f1e call 2f93573 1717->1807 1718 2f90f24-2f90f4e 1721 2f90f57-2f90f5a call 2f94ad9 1718->1721 1722 2f90f60-2f90f8a 1721->1722 1725 2f90f93 1722->1725 1810 2f90f96 call 2f9b4a0 1725->1810 1811 2f90f96 call 2f9b4f3 1725->1811 1812 2f90f96 call 2f9b493 1725->1812 1726 2f90f9c-2f90fc6 1729 2f90fcf-2f90fd5 call 2f9bbd3 1726->1729 1730 2f90fdb-2f91017 1729->1730 1733 2f91023-2f91029 call 2f9beb0 1730->1733 1734 2f9102f-2f9106b 1733->1734 1737 2f91077-2f9107d call 2f9c190 1734->1737 1738 2f91083-2f910bf 1737->1738 1741 2f910cb 1738->1741 1793 2f910d1 call 2f9c190 1741->1793 1794 2f910d1 call 2f9c470 1741->1794 1742 2f910d7-2f91113 1745 2f9111f 1742->1745 1797 2f91125 call 2f9c190 1745->1797 1798 2f91125 call 2f9c470 1745->1798 1799 2f91125 call 2f9c753 1745->1799 1746 2f9112b-2f91167 1749 2f91173-2f91179 call 2f9ca33 1746->1749 1750 2f9117f-2f9122a 1749->1750 1758 2f91235-2f91241 call 2f9cd10 1750->1758 1759 2f91247-2f91253 1758->1759 1760 2f9125e-2f9126a call 2f9cd10 1759->1760 1761 2f91270-2f9127c 1760->1761 1762 2f91287-2f91293 call 2f9cd10 1761->1762 1763 2f91299-2f912a5 1762->1763 1764 2f912b0-2f912bc call 2f9cd10 1763->1764 1765 2f912c2-2f912ce 1764->1765 1766 2f912d9-2f912e5 call 2f9cd10 1765->1766 1767 2f912eb-2f912f7 1766->1767 1768 2f91302-2f9130e call 2f9cd10 1767->1768 1769 2f91314-2f91320 1768->1769 1770 2f9132b-2f91337 call 2f9cd10 1769->1770 1771 2f9133d-2f91349 1770->1771 1772 2f91354-2f91360 call 2f9cd10 1771->1772 1773 2f91366-2f91372 1772->1773 1774 2f9137d-2f91389 call 2f9cd10 1773->1774 1775 2f9138f-2f9139b 1774->1775 1776 2f913a6-2f913b2 call 2f9cd10 1775->1776 1777 2f913b8-2f9146b 1776->1777 1793->1742 1794->1742 1797->1746 1798->1746 1799->1746 1800->1715 1801->1715 1802->1717 1803->1717 1804->1718 1805->1718 1806->1718 1807->1718 1810->1726 1811->1726 1812->1726
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3a16565ad3ae7cf1c70129ce5fd592324d2dc65561cc071fb9ff6a0e7cc25cdc
                                      • Instruction ID: 3e8462e461bca877d955415e064ec50107edc34ef2b97d276263428971cb9a6d
                                      • Opcode Fuzzy Hash: 3a16565ad3ae7cf1c70129ce5fd592324d2dc65561cc071fb9ff6a0e7cc25cdc
                                      • Instruction Fuzzy Hash: E922A174A00219CFDB54DF65ED85A9DBBB2FF88301F1082A9D809AB364DB746D85CF81

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1818 2f90ca0-2f90cc0 1820 2f90cc2 1818->1820 1821 2f90cc7-2f90eeb call 2f9070c * 8 1818->1821 1820->1821 1961 2f90eee call 2f91f08 1821->1961 1962 2f90eee call 2f91f61 1821->1962 1873 2f90ef4-2f90f09 1963 2f90f0c call 2f93428 1873->1963 1964 2f90f0c call 2f93418 1873->1964 1875 2f90f12-2f90f1b 1965 2f90f1e call 2f938f9 1875->1965 1966 2f90f1e call 2f93908 1875->1966 1967 2f90f1e call 2f93580 1875->1967 1968 2f90f1e call 2f93573 1875->1968 1876 2f90f24-2f90f93 call 2f94ad9 1971 2f90f96 call 2f9b4a0 1876->1971 1972 2f90f96 call 2f9b4f3 1876->1972 1973 2f90f96 call 2f9b493 1876->1973 1884 2f90f9c-2f910cb call 2f9bbd3 call 2f9beb0 call 2f9c190 1954 2f910d1 call 2f9c190 1884->1954 1955 2f910d1 call 2f9c470 1884->1955 1900 2f910d7-2f9111f 1958 2f91125 call 2f9c190 1900->1958 1959 2f91125 call 2f9c470 1900->1959 1960 2f91125 call 2f9c753 1900->1960 1904 2f9112b-2f913b2 call 2f9ca33 call 2f9cd10 * 10 1935 2f913b8-2f9146b 1904->1935 1954->1900 1955->1900 1958->1904 1959->1904 1960->1904 1961->1873 1962->1873 1963->1875 1964->1875 1965->1876 1966->1876 1967->1876 1968->1876 1971->1884 1972->1884 1973->1884
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 043083ca4e9a06de2911e4a78e01faca3fa89a32eae9277662f931353acb4fe4
                                      • Instruction ID: 98034f34b44b62513c303823627e876b07e074d9b6c53095e6266dee368d0a6c
                                      • Opcode Fuzzy Hash: 043083ca4e9a06de2911e4a78e01faca3fa89a32eae9277662f931353acb4fe4
                                      • Instruction Fuzzy Hash: 6322A174A00219CFDB54DF65ED85A9DBBB2FF88301F1082A9D809AB364DB746D85CF81
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1d2e748a4c93a73043938f77ef1b4bb7888db36a1b6515d6fc8825ee0f068d1b
                                      • Instruction ID: c87a63020334ddcf171475a156989884ca2eb2c241c23d58f1f535251f2a17ba
                                      • Opcode Fuzzy Hash: 1d2e748a4c93a73043938f77ef1b4bb7888db36a1b6515d6fc8825ee0f068d1b
                                      • Instruction Fuzzy Hash: 4FB11C71B102018FFF599F29C968B393696AF876C4F18446AE702DB3A1EF25CC41C751

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2298 2f96e58-2f96e62 2299 2f96e69-2f96e6c 2298->2299 2300 2f96e64 2298->2300 2301 2f96e6d-2f96e8d 2299->2301 2302 2f96e14-2f96e2f 2300->2302 2303 2f96e66 2300->2303 2304 2f972bc-2f972c0 2301->2304 2305 2f96e93-2f96eb6 2301->2305 2317 2f96e4c-2f96e50 2302->2317 2318 2f96e31-2f96e4b 2302->2318 2303->2301 2306 2f96e68 2303->2306 2307 2f972d9-2f972e7 2304->2307 2308 2f972c2-2f972d6 2304->2308 2319 2f96ebc-2f96ec9 2305->2319 2320 2f96f64-2f96f68 2305->2320 2306->2299 2315 2f972e9-2f972fe 2307->2315 2316 2f97358-2f9736d 2307->2316 2329 2f97300-2f97303 2315->2329 2330 2f97305-2f97312 2315->2330 2331 2f9736f-2f97372 2316->2331 2332 2f97374-2f97381 2316->2332 2336 2f96ed8 2319->2336 2337 2f96ecb-2f96ed6 2319->2337 2322 2f96f6a-2f96f78 2320->2322 2323 2f96fb0-2f96fb9 2320->2323 2322->2323 2342 2f96f7a-2f96f95 2322->2342 2326 2f973cf 2323->2326 2327 2f96fbf-2f96fc9 2323->2327 2343 2f973d4-2f973ea 2326->2343 2327->2304 2333 2f96fcf-2f96fd8 2327->2333 2338 2f97314-2f97355 2329->2338 2330->2338 2339 2f97383-2f973be 2331->2339 2332->2339 2340 2f96fda-2f96fdf 2333->2340 2341 2f96fe7-2f96ff3 2333->2341 2344 2f96eda-2f96edc 2336->2344 2337->2344 2388 2f973c5-2f973cc 2339->2388 2340->2341 2341->2343 2349 2f96ff9-2f96fff 2341->2349 2370 2f96fa3 2342->2370 2371 2f96f97-2f96fa1 2342->2371 2356 2f973ec 2343->2356 2357 2f973f1-2f97404 2343->2357 2344->2320 2351 2f96ee2-2f96f44 2344->2351 2352 2f97005-2f97015 2349->2352 2353 2f972a6-2f972aa 2349->2353 2400 2f96f4a-2f96f61 2351->2400 2401 2f96f46 2351->2401 2368 2f97029-2f9702b 2352->2368 2369 2f97017-2f97027 2352->2369 2353->2326 2359 2f972b0-2f972b6 2353->2359 2356->2357 2372 2f9741d-2f97424 2357->2372 2373 2f97406-2f9741c 2357->2373 2359->2304 2359->2333 2374 2f9702e-2f97034 2368->2374 2369->2374 2375 2f96fa5-2f96fa7 2370->2375 2371->2375 2374->2353 2381 2f9703a-2f97049 2374->2381 2375->2323 2382 2f96fa9 2375->2382 2384 2f9704f 2381->2384 2385 2f970f7-2f97122 call 2f96ca0 * 2 2381->2385 2382->2323 2386 2f97052-2f97063 2384->2386 2402 2f97128-2f9712c 2385->2402 2403 2f9720c-2f97226 2385->2403 2386->2343 2390 2f97069-2f9707b 2386->2390 2390->2343 2393 2f97081-2f97099 2390->2393 2456 2f9709b call 2f97438 2393->2456 2457 2f9709b call 2f97428 2393->2457 2396 2f970a1-2f970b1 2396->2353 2399 2f970b7-2f970ba 2396->2399 2404 2f970bc-2f970c2 2399->2404 2405 2f970c4-2f970c7 2399->2405 2400->2320 2401->2400 2402->2353 2406 2f97132-2f97136 2402->2406 2403->2304 2425 2f9722c-2f97230 2403->2425 2404->2405 2407 2f970cd-2f970d0 2404->2407 2405->2326 2405->2407 2410 2f97138-2f97145 2406->2410 2411 2f9715e-2f97164 2406->2411 2412 2f970d8-2f970db 2407->2412 2413 2f970d2-2f970d6 2407->2413 2428 2f97154 2410->2428 2429 2f97147-2f97152 2410->2429 2415 2f9719f-2f971a5 2411->2415 2416 2f97166-2f9716a 2411->2416 2412->2326 2414 2f970e1-2f970e5 2412->2414 2413->2412 2413->2414 2414->2326 2422 2f970eb-2f970f1 2414->2422 2419 2f971b1-2f971b7 2415->2419 2420 2f971a7-2f971ab 2415->2420 2416->2415 2417 2f9716c-2f97175 2416->2417 2423 2f97184-2f9719a 2417->2423 2424 2f97177-2f9717c 2417->2424 2426 2f971b9-2f971bd 2419->2426 2427 2f971c3-2f971c5 2419->2427 2420->2388 2420->2419 2422->2385 2422->2386 2423->2353 2424->2423 2430 2f9726c-2f97270 2425->2430 2431 2f97232-2f9723c call 2f95b50 2425->2431 2426->2353 2426->2427 2432 2f971fa-2f971fc 2427->2432 2433 2f971c7-2f971d0 2427->2433 2434 2f97156-2f97158 2428->2434 2429->2434 2430->2388 2437 2f97276-2f9727a 2430->2437 2431->2430 2445 2f9723e-2f97253 2431->2445 2432->2353 2435 2f97202-2f97209 2432->2435 2440 2f971df-2f971f5 2433->2440 2441 2f971d2-2f971d7 2433->2441 2434->2353 2434->2411 2437->2388 2442 2f97280-2f9728d 2437->2442 2440->2353 2441->2440 2447 2f9729c 2442->2447 2448 2f9728f-2f9729a 2442->2448 2445->2430 2453 2f97255-2f9726a 2445->2453 2450 2f9729e-2f972a0 2447->2450 2448->2450 2450->2353 2450->2388 2453->2304 2453->2430 2456->2396 2457->2396
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a08ce94dfe14780ef581c033aad661e2ff3d1ba3de4bbac242328eee9f312a67
                                      • Instruction ID: 6945649361e801620d933498c91c3df71c61cd10a2ad54baf08e79eee92987ff
                                      • Opcode Fuzzy Hash: a08ce94dfe14780ef581c033aad661e2ff3d1ba3de4bbac242328eee9f312a67
                                      • Instruction Fuzzy Hash: 6BC13771A102099FEF14DFA9C884A9EBBF6BF48748F158159EA19EB261D731EC40CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2458 2f956a8-2f956ca 2460 2f956cc-2f956d0 2458->2460 2461 2f956e0-2f956eb 2458->2461 2464 2f956f8-2f956ff 2460->2464 2465 2f956d2-2f956de 2460->2465 2462 2f956f1-2f956f3 2461->2462 2463 2f95793-2f957bf 2461->2463 2466 2f9578b-2f95790 2462->2466 2472 2f957c6-2f9581e 2463->2472 2467 2f9571f-2f95728 2464->2467 2468 2f95701-2f95708 2464->2468 2465->2461 2465->2464 2566 2f9572a call 2f956a8 2467->2566 2567 2f9572a call 2f95698 2467->2567 2468->2467 2469 2f9570a-2f95715 2468->2469 2471 2f9571b-2f9571d 2469->2471 2469->2472 2471->2466 2491 2f9582d-2f9583f 2472->2491 2492 2f95820-2f95826 2472->2492 2473 2f95730-2f95732 2474 2f9573a-2f95742 2473->2474 2475 2f95734-2f95738 2473->2475 2479 2f95751-2f95753 2474->2479 2480 2f95744-2f95749 2474->2480 2475->2474 2478 2f95755-2f95766 2475->2478 2568 2f95769 call 2f96118 2478->2568 2569 2f95769 call 2f96108 2478->2569 2479->2466 2480->2479 2483 2f9576f-2f95774 2484 2f95789 2483->2484 2485 2f95776-2f9577f 2483->2485 2484->2466 2561 2f95781 call 2f9a70d 2485->2561 2562 2f95781 call 2f9a660 2485->2562 2563 2f95781 call 2f9a650 2485->2563 2488 2f95787 2488->2466 2494 2f958d3-2f958d5 2491->2494 2495 2f95845-2f95849 2491->2495 2492->2491 2564 2f958d7 call 2f95a70 2494->2564 2565 2f958d7 call 2f95a63 2494->2565 2496 2f95859-2f95866 2495->2496 2497 2f9584b-2f95857 2495->2497 2503 2f95868-2f95872 2496->2503 2497->2503 2498 2f958dd-2f958e3 2501 2f958ef-2f958f6 2498->2501 2502 2f958e5-2f958eb 2498->2502 2504 2f958ed 2502->2504 2505 2f95951-2f959b0 2502->2505 2508 2f9589f-2f958a3 2503->2508 2509 2f95874-2f95883 2503->2509 2504->2501 2518 2f959b7-2f959db 2505->2518 2510 2f958af-2f958b3 2508->2510 2511 2f958a5-2f958ab 2508->2511 2520 2f95893-2f9589d 2509->2520 2521 2f95885-2f9588c 2509->2521 2510->2501 2515 2f958b5-2f958b9 2510->2515 2513 2f958f9-2f9594a 2511->2513 2514 2f958ad 2511->2514 2513->2505 2514->2501 2517 2f958bf-2f958d1 2515->2517 2515->2518 2517->2501 2531 2f959dd-2f959df 2518->2531 2532 2f959e1-2f959e3 2518->2532 2520->2508 2521->2520 2534 2f95a59-2f95a5c 2531->2534 2535 2f959e5-2f959e9 2532->2535 2536 2f959f4-2f959f6 2532->2536 2537 2f959eb-2f959ed 2535->2537 2538 2f959ef-2f959f2 2535->2538 2539 2f95a09-2f95a0f 2536->2539 2540 2f959f8-2f959fc 2536->2540 2537->2534 2538->2534 2544 2f95a3a-2f95a3c 2539->2544 2545 2f95a11-2f95a38 2539->2545 2542 2f959fe-2f95a00 2540->2542 2543 2f95a02-2f95a07 2540->2543 2542->2534 2543->2534 2548 2f95a43-2f95a45 2544->2548 2545->2548 2552 2f95a4b-2f95a4d 2548->2552 2553 2f95a47-2f95a49 2548->2553 2554 2f95a4f-2f95a54 2552->2554 2555 2f95a56 2552->2555 2553->2534 2554->2534 2555->2534 2561->2488 2562->2488 2563->2488 2564->2498 2565->2498 2566->2473 2567->2473 2568->2483 2569->2483
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 803cc9a5b5ea125ab6f2c0502acb0eeb949a30e89e804b382698ac50de929ba1
                                      • Instruction ID: b3e551a076832ab49f970df3f39be4943e59d643cd3e5c23b98adc6e5c96b844
                                      • Opcode Fuzzy Hash: 803cc9a5b5ea125ab6f2c0502acb0eeb949a30e89e804b382698ac50de929ba1
                                      • Instruction Fuzzy Hash: 2391C031B042159FEF169F25C894B3E7BA2FB88244F58842DEA069B391DF758C41DB91
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a20169fd2987d046fb419ddae622fdbc90d6045201dee41ad2fc5ec259f5c41e
                                      • Instruction ID: 600e273787babe8e9536cc0350c5660e387dce93712027fbfd11f738c6eac480
                                      • Opcode Fuzzy Hash: a20169fd2987d046fb419ddae622fdbc90d6045201dee41ad2fc5ec259f5c41e
                                      • Instruction Fuzzy Hash: 82914B70B007069FDB54EF79C894A2EB7F2BF8C210B508629D50ACB755EB74E8458B94
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: abad818983fca46b02880149164eccabf6f9b121e8b9c53700c25ad8d395cd7b
                                      • Instruction ID: 1fde63fc627935b0ba9e0f2140ceb92a83f0f63710e40ab0cd8a8aeec5ab57d7
                                      • Opcode Fuzzy Hash: abad818983fca46b02880149164eccabf6f9b121e8b9c53700c25ad8d395cd7b
                                      • Instruction Fuzzy Hash: 6A81B031B041058FEF16DFB9C888A69B7B6FF88284B94816AD606EB361D731EC41CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8924575ca0a56195275c6af628807d38f3e85aff2964e92b4e739be49ff2d805
                                      • Instruction ID: 2b327248adb3931aca8f098e0844ede807fc78cfad2536c29348a361a64816da
                                      • Opcode Fuzzy Hash: 8924575ca0a56195275c6af628807d38f3e85aff2964e92b4e739be49ff2d805
                                      • Instruction Fuzzy Hash: DA71F974B20205CFDF55EF2DC894AA9BBE6AF49684F1540A5E606CB3B1DB70DC41CB90
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1ab0f91fa88862d659d66c14034e12755831eff2d04326da23301cf4c539003e
                                      • Instruction ID: a90ba9c9c51fabf60962f275056cadbe25c0f56da0c0771b113c0096a0bd3e61
                                      • Opcode Fuzzy Hash: 1ab0f91fa88862d659d66c14034e12755831eff2d04326da23301cf4c539003e
                                      • Instruction Fuzzy Hash: 7A71F435A112199FDF19EFA5D858AADBFB2FF88310F148129E806AB250DF349942CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c2e33311f08ea2bc31bb167cebadc7e3f0b3c5543e6986e8f34413a2078d176
                                      • Instruction ID: 71d11f075adfeebbde1a64afa8541fde413d9f765f017efc2e92df4ab72f0096
                                      • Opcode Fuzzy Hash: 8c2e33311f08ea2bc31bb167cebadc7e3f0b3c5543e6986e8f34413a2078d176
                                      • Instruction Fuzzy Hash: 0E51BA30235343CFC2242F22A6AE56ABFA5FB0F367705AC44F40E994299F715859EB21
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30b2b31d4ddec8b673b3b4a417fc6fc8ccf9f450597bf40d469b6475782a5972
                                      • Instruction ID: bdf5675cc5a41e2a9aeeebc550aca6e9963f062f1ffef11784a7919bb7d2e04a
                                      • Opcode Fuzzy Hash: 30b2b31d4ddec8b673b3b4a417fc6fc8ccf9f450597bf40d469b6475782a5972
                                      • Instruction Fuzzy Hash: F3519970231347CFC2242F62E6AE52ABFA5FB4F367705AC00F50E894299F705859AB24
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a17396c0a7569a4e97a7f4009f77c3f78546f15f3c602ab4325806d228327421
                                      • Instruction ID: f8a7446a71be3da4703d7ec6d1ad0afbd6d87a81af1e672e99e45a5fdac2c796
                                      • Opcode Fuzzy Hash: a17396c0a7569a4e97a7f4009f77c3f78546f15f3c602ab4325806d228327421
                                      • Instruction Fuzzy Hash: 83519D30941319CFEB24EFA4D46C3EEBBB1FB4A356F104869D202662E0CBB80A44CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 527a5d4c6b1e57bd9a6d577d642baa472050c5aefc26729ee4605705ee6b8ee1
                                      • Instruction ID: 3f6098eff68ad3a006477ac7b812be2d4f882ca9acaf67c18c154b364dc0fa36
                                      • Opcode Fuzzy Hash: 527a5d4c6b1e57bd9a6d577d642baa472050c5aefc26729ee4605705ee6b8ee1
                                      • Instruction Fuzzy Hash: DB51B675E01208DFDB08DFA9D99099DBBB2FF8D300B209169E905AB364DB35AC46CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bb0f99da3b9e165e09cecb9714a75a3266a883f40b84ecb1a302a190244310cc
                                      • Instruction ID: 383e69f5cad51108e2a385ec33cb1c98acfc6a0aaafa510d3c935dab851b30b0
                                      • Opcode Fuzzy Hash: bb0f99da3b9e165e09cecb9714a75a3266a883f40b84ecb1a302a190244310cc
                                      • Instruction Fuzzy Hash: 52519474E01218DFDB44DFA9D5849DDBBF2BF89300F24816AE919AB365DB31A901CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cadcb338e50caae43a6ec930c6ce995abae09677bd445897895ae6e8af385af4
                                      • Instruction ID: 6ab6752b54f069599f4f1580ffd3ec24725d73a5d5f1e4a0f894da8e88ef2f78
                                      • Opcode Fuzzy Hash: cadcb338e50caae43a6ec930c6ce995abae09677bd445897895ae6e8af385af4
                                      • Instruction Fuzzy Hash: CE519575E01208CFDB08DFAAD99499DBBB2FF8D300B209169E905AB364DB35AC45CF50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4090154097a194de32b23a8c7676507786667bd189c26ca275c350f5c0bf83e5
                                      • Instruction ID: c1382cc6b148a65e55dca5785d20029404c8da2bd165286b5345131b5b12f608
                                      • Opcode Fuzzy Hash: 4090154097a194de32b23a8c7676507786667bd189c26ca275c350f5c0bf83e5
                                      • Instruction Fuzzy Hash: 7C418C70B007069FEB54EF75C891A2EB7B6FF88250B048629E516CB751EF74E841CBA4
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c7f436b6e57a8c4d313215ca6ecb71f5b8f0ee7b49d558ddf739b74e18ba5d8
                                      • Instruction ID: 79f437458a1a9d95a7bcefdf6aa461d2163425a9a6a38bde27d7ce54dc5ab53c
                                      • Opcode Fuzzy Hash: 4c7f436b6e57a8c4d313215ca6ecb71f5b8f0ee7b49d558ddf739b74e18ba5d8
                                      • Instruction Fuzzy Hash: EE41C131A04249DFEF15CFA4C844B9DBFB2FF49394F058159EA15AB2A1D3B4E950CBA0
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8f850c565c4af17beb8f0a6d58e9cb50172a84f93b0c288dd69376cac7c307af
                                      • Instruction ID: b5c09dddaf0ef56fd862a5d8afad9a17593a234011b1b2c9c1176988689e3a88
                                      • Opcode Fuzzy Hash: 8f850c565c4af17beb8f0a6d58e9cb50172a84f93b0c288dd69376cac7c307af
                                      • Instruction Fuzzy Hash: BA413775E04208CFEF14EFA8D884BEDBBB2FB49344F609129D619A7284DB359842CF15
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3b91a79c393a57aa920270d749d189a3bd8a44356596aa296543c6600064d203
                                      • Instruction ID: a4af920deaac4432fba2319f1578d90d8b96378bb0b25d7bf50ba0b2c276abc6
                                      • Opcode Fuzzy Hash: 3b91a79c393a57aa920270d749d189a3bd8a44356596aa296543c6600064d203
                                      • Instruction Fuzzy Hash: 80413771E00208CFEF00EFA8D484AEDBBB1FB49344F609115D609A7245D7359841CF15
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ca6ee24a054b1165df7d57db829483fe816354c5507292ad999df9b1f9d976a8
                                      • Instruction ID: 9e936208622000e260ea29ebf9a121ac1f0cfac90054b638f0c5216c2f993816
                                      • Opcode Fuzzy Hash: ca6ee24a054b1165df7d57db829483fe816354c5507292ad999df9b1f9d976a8
                                      • Instruction Fuzzy Hash: 31312B36F003258BFF1D496A8A9437F65D6BBC9294F154179DA06D3380DFB4CC418791
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40d5a07ae979545b3daf2ce2e031fa6a6ff5822d2acf225fa4ae5703d76c4f41
                                      • Instruction ID: c6afdb9ccaf9f185c32d9cfed4983dba4d72d770617c1a18583712896fc52f11
                                      • Opcode Fuzzy Hash: 40d5a07ae979545b3daf2ce2e031fa6a6ff5822d2acf225fa4ae5703d76c4f41
                                      • Instruction Fuzzy Hash: 1741F371E01208CFEF14EFA8E484AEDBBB6FB49345F209129E619B7284D7359842CF55
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 245ade828204dbc109b720d38a17707c6b98bbc6150f68134ac0d1145e368fc7
                                      • Instruction ID: 11c58d3195edf38bfbb394ebc38d4c1107f7ecc691ffe0dc2407720a4a3c93df
                                      • Opcode Fuzzy Hash: 245ade828204dbc109b720d38a17707c6b98bbc6150f68134ac0d1145e368fc7
                                      • Instruction Fuzzy Hash: 1841F671E00208CFEB14EFAAD844AEEFBB6BB89344F24D129D614B7294DB759841CF54
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 751a650d1f2476ab6f8d65fe6f837caf500478ba278e1352df90c8ea16674bd5
                                      • Instruction ID: 0b2fa27014b758fd436ea7aa28ff35bdd818589c7b07070047e56f0c8c30e489
                                      • Opcode Fuzzy Hash: 751a650d1f2476ab6f8d65fe6f837caf500478ba278e1352df90c8ea16674bd5
                                      • Instruction Fuzzy Hash: EC31A23570021A9FDF059F65D854AAF3FB6FB68254F008429FA1587290CB38DC66DFA0
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3ab4378fc35a6ed71705c54b0d9a8e27c51f2a34daa13b4233aa56c20291ac76
                                      • Instruction ID: d92ce5a38463cd4573dbb543450adb3f572dcc9a680cb3d6237be1d37048881a
                                      • Opcode Fuzzy Hash: 3ab4378fc35a6ed71705c54b0d9a8e27c51f2a34daa13b4233aa56c20291ac76
                                      • Instruction Fuzzy Hash: 9831AF30B043054FEB16A7BA9C50A6A3FAADFD518478440BADA01CB293EE71DC45CBA1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6e4b83a742d19c56bf23124412402964bde03c738743e9ded7091b763d286bd5
                                      • Instruction ID: ce56b241de75a35cbd49c1a8b6e8f97d303d229757005ea40ba4ebdd91c485cb
                                      • Opcode Fuzzy Hash: 6e4b83a742d19c56bf23124412402964bde03c738743e9ded7091b763d286bd5
                                      • Instruction Fuzzy Hash: 6131CF31B102089FDB089F65D8657AE7BF6BB8C600F148469EA06E73A1DE359C01DBA5
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3b4963020323597f7b840e014450f63db151ea1afca09ca63795689fea1fb3a1
                                      • Instruction ID: 2ec6ff96c8274d0d3015f69b5bd47bd4a2b370bd2198b0f9b6350974c43dd8c2
                                      • Opcode Fuzzy Hash: 3b4963020323597f7b840e014450f63db151ea1afca09ca63795689fea1fb3a1
                                      • Instruction Fuzzy Hash: D6215770B243081BFF2522398894B3DBA97AFC52947044079E706C7751EF22CC41E782
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b70bf418aa89f72a0fe2ab611edb3293d14cd876f8a87f97ec96992fa3907edc
                                      • Instruction ID: 952aa51d5dfc7ba1eadb70adc59f56aa78fd2fdee4b492db70086cd505271efc
                                      • Opcode Fuzzy Hash: b70bf418aa89f72a0fe2ab611edb3293d14cd876f8a87f97ec96992fa3907edc
                                      • Instruction Fuzzy Hash: C121D071E002488FEF09EFAAD8053EDBBB6AFCA344F14D025C604B72A5D7708506CE50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ba933c8ebcb730dabaf45b43d3bbc9dbe88c16d35f855c6a06c6ea18abcac6aa
                                      • Instruction ID: c1e513e3541489925b9836a1b3644bf5a1ad86deeeec472ac959cb36e2c3ab2a
                                      • Opcode Fuzzy Hash: ba933c8ebcb730dabaf45b43d3bbc9dbe88c16d35f855c6a06c6ea18abcac6aa
                                      • Instruction Fuzzy Hash: 7731C670E001158FDF05CF69C8889AEBBB2FF88354B158159E515973A5CB30EC42CF90
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ebec2a8f1f2008937c26dcda1b7c2de6af19cb4b80a4c0a389f035728e1ca93c
                                      • Instruction ID: 5a8a4d1abe62333d2fbea9e033c4a04f07b91396da250a8a507f6cd6924c50e8
                                      • Opcode Fuzzy Hash: ebec2a8f1f2008937c26dcda1b7c2de6af19cb4b80a4c0a389f035728e1ca93c
                                      • Instruction Fuzzy Hash: D421D6747243185BFF2826358894B3AB697AFC4794F144078E706CB794EF66CC41D782
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 09cac5aaed4db9ef856d2ad2d6c759c6540f3198c3829e47cfc9d5bbee714d8d
                                      • Instruction ID: 3952ce43d350ab772a7f99be4b8b1f9ed77cf527f69343ab192f5d3b6e9bc6b4
                                      • Opcode Fuzzy Hash: 09cac5aaed4db9ef856d2ad2d6c759c6540f3198c3829e47cfc9d5bbee714d8d
                                      • Instruction Fuzzy Hash: B931B331E013158BEF21DF65C4407AEBBF5AF88690F448629D516E7A60CB74AC84CF91
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0751464206c48e9a3f493921a9e5cee16d9096ed39c02bbc6b45fb6d778f73be
                                      • Instruction ID: 6b9dd6123174c4ecdc15fa25e9bc8731369a63fe9ea81673d5dd03ff1b378bb7
                                      • Opcode Fuzzy Hash: 0751464206c48e9a3f493921a9e5cee16d9096ed39c02bbc6b45fb6d778f73be
                                      • Instruction Fuzzy Hash: 32313E35A003198FEF19EF79D4546ADBBB2AF88250F148529E416EB750DF349842CF60
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e7cd7e64cfac1ea7e854a5ce373fce6de7b350f894cb06fb88e8122e7c91216c
                                      • Instruction ID: 92d630fdb086b82101806237a621941900e299b54b2c0de7dd83e515998443a2
                                      • Opcode Fuzzy Hash: e7cd7e64cfac1ea7e854a5ce373fce6de7b350f894cb06fb88e8122e7c91216c
                                      • Instruction Fuzzy Hash: 1321A335E00214AFDF15DB68C8409AE3BA6FF997A0F50C069ED058B254DB35EE81CBD1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 48455274300a78ba747a6ab6d6718dc2535c38737bae982d6e1377fffb52b7a5
                                      • Instruction ID: cd31917bd964bb9dd5506641a31587184f09859f13053dd7b1445687ad7c5cbf
                                      • Opcode Fuzzy Hash: 48455274300a78ba747a6ab6d6718dc2535c38737bae982d6e1377fffb52b7a5
                                      • Instruction Fuzzy Hash: EB2196357016128FDB2A9A29C49452F7B67FB887957548179E906DB350CF34DC06CBC4
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164298338.000000000143D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0143D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_143d000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7e0d0a528194974872c9990a30d5c9dfcf7ae98da59e2bd5df9ac7d20220359d
                                      • Instruction ID: 1438929636140ff67ce3ef19e40efc42fee61011eb2c3ee253228303a048afba
                                      • Opcode Fuzzy Hash: 7e0d0a528194974872c9990a30d5c9dfcf7ae98da59e2bd5df9ac7d20220359d
                                      • Instruction Fuzzy Hash: 8E2103B1904204DFDB15CF64C980B16FB75EBC8718F60C56AE9094B362C736D447CA62
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3e7593e92de752b2c179a9e42f5d5e2550efa62862810f8f610c220feb0dabb4
                                      • Instruction ID: 2fb7a237df8f49d47b8fac6b0c2d342cca1c99e67aaea2466122606a80924acc
                                      • Opcode Fuzzy Hash: 3e7593e92de752b2c179a9e42f5d5e2550efa62862810f8f610c220feb0dabb4
                                      • Instruction Fuzzy Hash: A421E071E013599BFF11CF65D4807ADBBB2AF48690F048629C506F7A60CB74AC848FA1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3afb1fca2cd7da11f859798115a85b723984c309019a63197848ddd169c79545
                                      • Instruction ID: e54906f66c298380352239a75a16bb7e54574ef5918e121d1de5b7b6ef69e244
                                      • Opcode Fuzzy Hash: 3afb1fca2cd7da11f859798115a85b723984c309019a63197848ddd169c79545
                                      • Instruction Fuzzy Hash: 5F21C036B102089FDF149E64D849BAEBFB6FB8C350F148169E611A7391CB31AC10DF90
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 06426bc51ccf5aa4ee62cb2aa7491d9c03e63e1a00188dc40a55d6b32882f7c4
                                      • Instruction ID: 22a3214ebc9eb56e6263f4fda35907f2ee5df6657a43dbb9c24edd72eb33987e
                                      • Opcode Fuzzy Hash: 06426bc51ccf5aa4ee62cb2aa7491d9c03e63e1a00188dc40a55d6b32882f7c4
                                      • Instruction Fuzzy Hash: 9511AF32F483899FCB029BBC9C104DEBF30FF892507258396E662B7191EA311906C751
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 347edac5f10af9064170e3ac07b1ed0ca7148fb7c7b36bc01240051287c309f3
                                      • Instruction ID: 0c1fdbc9fab610df686effec826101944e0f6e0c53aa7afedc5defe79e9e906c
                                      • Opcode Fuzzy Hash: 347edac5f10af9064170e3ac07b1ed0ca7148fb7c7b36bc01240051287c309f3
                                      • Instruction Fuzzy Hash: D511E935B016119FDB1A5E29C8A463E7BA6FF88795B584178EA06DB350DF30DC06CBC4
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b1efdfa2cf1405c948b095ae07c002a7a21c77747eaed1a6020253f11724c5ad
                                      • Instruction ID: d7f89802a3239450cf09154a637a0378e5077a9395d75dda70f03dc3f2232de6
                                      • Opcode Fuzzy Hash: b1efdfa2cf1405c948b095ae07c002a7a21c77747eaed1a6020253f11724c5ad
                                      • Instruction Fuzzy Hash: D9113A75E002498BEF08DFAAD8446EEBBB6ABC9345F24C025D618B72A5D77448068E54
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 14678f0e1f159d657e6a3c831b87a58758de4849271a80d725e5320bd2054cb2
                                      • Instruction ID: bdfcd5fae5d4a007229bf14503cc2b8aab699f88972d47bdecbae3774f05945d
                                      • Opcode Fuzzy Hash: 14678f0e1f159d657e6a3c831b87a58758de4849271a80d725e5320bd2054cb2
                                      • Instruction Fuzzy Hash: 5B213874C0420A8FDF11EFA8C8545EEBFF0BF49314F0451AAD945B7258EB301A4ADBA2
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6d46c145f2a9fcb144e980ad03da1191465d0f2095a37edfb883b8d1858b44bd
                                      • Instruction ID: 8d953d842a74a19c95947415e57427b38dccf83ce4f30c6d15bb65ec2e70d3de
                                      • Opcode Fuzzy Hash: 6d46c145f2a9fcb144e980ad03da1191465d0f2095a37edfb883b8d1858b44bd
                                      • Instruction Fuzzy Hash: 9011ACB07012058FD740AF7AC090A2AB7E5FF89B80794447DD60ACB361DB75DC048B64
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cd09329c2d5910402329406508d6d480e807a4c766a978a1d681ee8e6c7ed995
                                      • Instruction ID: 7fe5201c249890ac42c62f94a05c70eec57eb6cf0f5c2309495c8018a95c68f6
                                      • Opcode Fuzzy Hash: cd09329c2d5910402329406508d6d480e807a4c766a978a1d681ee8e6c7ed995
                                      • Instruction Fuzzy Hash: 0A21F2B4C0420A8FCB04EFA8D8455EEBFF0FB09300F04816AD919B3224EB301A45CBA2
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a1991d7a535a0a58d6c2a8774ad5486326ec21b3f9ad12bd2e7878f5f0565cec
                                      • Instruction ID: 4bbfe8a625a332a551e362b0e5cd06a6b9e97d1e2c601e80bbe5556c592274df
                                      • Opcode Fuzzy Hash: a1991d7a535a0a58d6c2a8774ad5486326ec21b3f9ad12bd2e7878f5f0565cec
                                      • Instruction Fuzzy Hash: 1A01F5317143049BEB040A3A585837BBEEFAFC9250B14857BE506C33A5CD348C018265
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 65a41670a42f7aaa31cd81a399ff2271a1afc2db322e9301e047201970d1b2a4
                                      • Instruction ID: 356a7e40154d4eb22870eae2082628023da7373f70bcdf56fc7e44575ae0ae3f
                                      • Opcode Fuzzy Hash: 65a41670a42f7aaa31cd81a399ff2271a1afc2db322e9301e047201970d1b2a4
                                      • Instruction Fuzzy Hash: 720122307082845FEB150B3A5C183BBBFEAABCA650B1884B6E14AC33A2CD348C019775
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164298338.000000000143D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0143D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_143d000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: af0032d31c21eee98164703ed9ecbad4511e5bcd2f12e312fdd1ff5dc5c24f5f
                                      • Instruction ID: cc34f36876e79327ada30077f634d4a63db242e5a1654877c24efc43c10cae64
                                      • Opcode Fuzzy Hash: af0032d31c21eee98164703ed9ecbad4511e5bcd2f12e312fdd1ff5dc5c24f5f
                                      • Instruction Fuzzy Hash: 9F11AC759042448FCB16CF54C5C4B16FB71FB88218F24C6AAD8494B362C33AD44ACB51
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7bb8216dbbaae28013059887678797da823b34b6d9ffe62319c40ce92888756f
                                      • Instruction ID: bd6b70e03beef1fedda3e14990655ce26d017dd52a53a14bc955aae487991c25
                                      • Opcode Fuzzy Hash: 7bb8216dbbaae28013059887678797da823b34b6d9ffe62319c40ce92888756f
                                      • Instruction Fuzzy Hash: 4E01A772A04255AFDF138E559810AEF3FA6DFD9390B188066FA14D7191CA71C812DBA1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3ad20a943c8f76cccc671ec8d6a149bbd0fe237d2e4953435c255efb45d0e08f
                                      • Instruction ID: a5c170dcfbba71d9df83d9246a2b7768b2e560f0b3eebd0148da74679c04e87f
                                      • Opcode Fuzzy Hash: 3ad20a943c8f76cccc671ec8d6a149bbd0fe237d2e4953435c255efb45d0e08f
                                      • Instruction Fuzzy Hash: 0BF0A2727012405FDF135B39E440626BBA4FF852E4B5040BBC219CB202DB32D405C7A1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 856c095605cd010b9d160ed968f60d766429b238e0b0b29ef96a369414ed0a0e
                                      • Instruction ID: 304cb4a63089cca9034e0776a8cfc2fe4916343daaa898dae782aba55a3e0472
                                      • Opcode Fuzzy Hash: 856c095605cd010b9d160ed968f60d766429b238e0b0b29ef96a369414ed0a0e
                                      • Instruction Fuzzy Hash: 5201DB72B001156F9F069E599810AAF3BABDBDC791B54802AFA05D7244CE75CC119BA4
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 70f07d1451c9e13d2d334c07f98e4b4906a3a51e1429b9cbd28ee81cfb8a5324
                                      • Instruction ID: bcddabff2b6046023f6864e9506af63cf30051cbdfe0a34d4fc63b1a472f77c2
                                      • Opcode Fuzzy Hash: 70f07d1451c9e13d2d334c07f98e4b4906a3a51e1429b9cbd28ee81cfb8a5324
                                      • Instruction Fuzzy Hash: 2CF02735E042448FEF21AEA4F8163FDB379E78A398F100435C604F32A2D770941A8A90
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e5de68abe37ff3e8f2bb4afc2f4ef5a354826e92a798c1c81d65e85d952b15ba
                                      • Instruction ID: b00397ff56543c48d6e8e631979058937d7e6fdc11b5e8bfbf086761b3a9ecc9
                                      • Opcode Fuzzy Hash: e5de68abe37ff3e8f2bb4afc2f4ef5a354826e92a798c1c81d65e85d952b15ba
                                      • Instruction Fuzzy Hash: E4F0E531E402499BEF19BE68E9087FAB3B89787351F206434CB08F71A6D7717416DA50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a51d9562951a52a2edac7b01bdad7befe5e61b63ea2903aae368b074eedf3be
                                      • Instruction ID: eb53cfd2da88cfe2a50fa85d2a836d2e40e87867e21c2d511626078e6e944546
                                      • Opcode Fuzzy Hash: 4a51d9562951a52a2edac7b01bdad7befe5e61b63ea2903aae368b074eedf3be
                                      • Instruction Fuzzy Hash: 18F03A71B11228CFCB94EF7CC54465E77F4AF0825072144A9D509DB320EB30DD008BD0
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2e5be0fef1c63cc58b1495f84056a9bec2e3565ae52340928ae08ff5466875a1
                                      • Instruction ID: e98c1fc06cda64bb3b7bba79292a2e99764b6e583ffa159d096bf8d0a374e231
                                      • Opcode Fuzzy Hash: 2e5be0fef1c63cc58b1495f84056a9bec2e3565ae52340928ae08ff5466875a1
                                      • Instruction Fuzzy Hash: A1E06831C103696BCF129BA08C044DEFF38FD97BA0B440197C92037013E7A02509C3B0
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a83e8954308bdb23c53a1727cc17d3d4d6159473cb361cec3803d7753104856
                                      • Instruction ID: 9eb6e4bcb0afcb941445ae1f24b794143a6ea2ee85fd017017dc56a3d4aa5a08
                                      • Opcode Fuzzy Hash: 4a83e8954308bdb23c53a1727cc17d3d4d6159473cb361cec3803d7753104856
                                      • Instruction Fuzzy Hash: 82E026F3D08190CBFB24AFAA6516078BF34CEE3281B9460C7C289EB165D318E206DB15
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d8c2efdba2db21ce987a946f60508d72ec50f61769ce208895902a4c458e9372
                                      • Instruction ID: adb55e89ea4bda4ffa2a26ff4a568488c3480e4caa5591296ce6f9feb045d3ad
                                      • Opcode Fuzzy Hash: d8c2efdba2db21ce987a946f60508d72ec50f61769ce208895902a4c458e9372
                                      • Instruction Fuzzy Hash: BFF0063600000EBFCF429F80CE45E897FAAFF09358F4A9091FA189A131D632D564EB44
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4fac0cb2d0dbd6f7678d7a3b3520e3fb86f3fbfd9c60dde2596fc3020e7a15ab
                                      • Instruction ID: 6f8a70d4bd77d134e82393acddb6c79b540ab4dc5d09f6c91dffdb9869f4d2ae
                                      • Opcode Fuzzy Hash: 4fac0cb2d0dbd6f7678d7a3b3520e3fb86f3fbfd9c60dde2596fc3020e7a15ab
                                      • Instruction Fuzzy Hash: BFE0B33600000EBFCF42AF90DA44CC97FAABB09258B4A9191FA189A131D632D5A5EB50
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b3bda61b20d2ad4899e349c55bcda0414247c1c01911b2af6b4155930b16d114
                                      • Instruction ID: 7575c555999c5751dd42c298764ec0471084e92922679b7c8193e70e1e0ea7b7
                                      • Opcode Fuzzy Hash: b3bda61b20d2ad4899e349c55bcda0414247c1c01911b2af6b4155930b16d114
                                      • Instruction Fuzzy Hash: B8D01231D6022A978B01AAA5DC044DEBB39FE95721B914666D51437140EB70265986E1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                      • Instruction ID: c0f85f59a69529bedaaab7d069670391f497c876dd9389e5447ec7e525d0119b
                                      • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                      • Instruction Fuzzy Hash: F8C0123360C1282AAA24108E7C40EA3AB8CC2C22F4A250137FA1CA3200A842AC8041A8
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 398ced4ec8cfc0c9e97cdd1db32ad2774d53e2947ab951939f6c141f4798103d
                                      • Instruction ID: 61b4b387f3d95a13727898fed246a0b726cedc32363981a90fd58168f4fbfbc2
                                      • Opcode Fuzzy Hash: 398ced4ec8cfc0c9e97cdd1db32ad2774d53e2947ab951939f6c141f4798103d
                                      • Instruction Fuzzy Hash: 7AD0677AB11108DFCB049F98E8409DDBBB6FB9C222B448116F915A3260C6319961DB94
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.3164994690.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_2f90000_fpIGwanLZi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 81cefa9076810b2ab0c3c967e9d0a5035c962275550db2d08cd92d3e0ff91676
                                      • Instruction ID: 32a81f614411b033bdf1db727b57399f1a91e1963fd24f456a886813c7262fdf
                                      • Opcode Fuzzy Hash: 81cefa9076810b2ab0c3c967e9d0a5035c962275550db2d08cd92d3e0ff91676
                                      • Instruction Fuzzy Hash: B4C0123011030F47E501E776ED45715372AB6E4504F84C550F01915565DEFC1CC58F96